However, the command and control servers are still active, so those Macs that are infected are still vulnerable to data theft and more."īesides, the firm said, it is "likely that this malware will be back in another guise in the future. Intego said that as of Thursday, "all of the servers that were providing the Flashback malware seem to be off-line this is likely to do the activities of the many security companies that have worked on exposing this malware and the servers it uses. Once installed, the malware can be used by criminals to steal personal information, including passwords. Initially a fake Adobe Flash installer (hence the name Flashback), it later changed to impersonate a Software Update dialog, before using Java vulnerabilities to install." ![]() Intego, maker of Mac security software, said the malware, known as Flashback, has "changed greatly from its first incarnation. Apple has now issued the second software update this week in order to patch the vulnerability in Java software that allowed the malware to spread to up to 600,000 Mac computers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |