Welcome to WebmasterWorld Guest from 220.127.116.11
Forum Moderators: travelin cat
The company, Dr. Web, issued a report on Wednesday that claimed 550,000 computers running Mac OSX were subject to Flashback. Later, Sorokin Ivan, an analyst at Dr. Web, sent a tweet upgrading the figure to 600,000 and added that 274 were based in Cupertino, Calif., Apple’s hometown. Fifty-seven percent of all Macs affected are in the U.S., while another 20% are based in Canada, according to the company.
joined:Jan 27, 2003
Caution: Manual disinfection is a risky process; it is recommended only for advanced users. Otherwise, please seek professional technical assistance.
joined:June 15, 2001
joined:Apr 13, 2002
...people get numb and complacent and simply click OK for everything.
The Mac OS X system itself is not less secure or prone to infection than Windows per se, but the Mac culture is conditioned to believe the OS is virtually invulnerable. Fewer users have any security software installed to protect their Mac OS X systems, and Mac OS X users are more likely to click links and open files without thinking twice.
It doesn't help anything that Apple perpetuates the myth of invulnerability. It takes time to develop a patch, but as soon as Apple was aware that the threat existed, it should have proactively communicated to Mac OS X users to make them aware. In fact, it should have provided users with instructions to disable Java and mitigate the threat pending a patch to resolve the issue. The fact that it didn't is probably a contributing factor to why the Flashback botnet is as large as it is... Apple needs to be more proactive, and more honest with users about security concerns if it wants to contain future threats and prevent massive outbreaks such as this.
...I never said Macs will never get viruses or other Malware. But historically its record versus other platforms compares favorably... Historically, Mac OS X has been substantially less vulnerable to this sort of thing than Windows.
This Java security update removes the most common variants of the Flashback malware.
This update also configures the Java web plug-in to disable the automatic execution of Java applets.
This Java security update removes the most common variants of the Flashback malware. If you do not use Java applets, it is recommended that you disable the Java web plug-in in your web browser.
This update is recommended for all Mac users with Java installed.
For more information on how to disable Java in your web browser see: [support.apple.com...]
For details about this update see: [support.apple.com...]
FYI, a restart is not required.