Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - I wanna txt u up.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » March 2013 » Macs in the crosshairs

Macs in the crosshairs


Contributed by: Email on 03/28/2013 02:34 PM [ comments Comments ]


Escalating current events that involved several series of emergency patches and intrusions into prominent companies have slightly distorted our view of the bigger picture: it appears that companies are being spied on with a high degree of technological effort – regardless of whether their employees are using Windows or Mac computers.

A short summary of events: Apparently, unknown perpetrators launched a very targeted attack and hacked iPhoneDevSDK, a forum that is mainly used by iOS app developers. The attackers injected into the forum an exploit for a previously unknown security hole in Java – things like that are worth five to six-digit figures on the black market. The hackers used the exploit to target and compromise the systems of developers working for Facebook, Apple and potentially Twitter. The attack focused on software developers in the mobile area, and its likely purpose was to obtain current project information from the victim's computer. Both Windows and Mac computers were affected.

At the same time, Adobe released a series of emergency patches for Flash and Reader. These patches were also triggered by 0-day holes that were exploited in attacks on both Windows and Mac computers. Sparse information concerning the targets, such as Adobe crediting arms manufacturer Lockheed Martin, points towards targeted industrial espionage.

The important lesson to be learnt from these intrusions is that software developers, engineers and other computer users who have access to information that could make them an attack target mustn't simply trust that their systems are safe – regardless of whether they are using Windows, Mac OS X or Linux. The bulk of malicious programs continues to focus on Windows; targeted attacks will concentrate on whatever the victim is using.

On the other hand, anti-virus vendors who are now crying wolf and pointing at the Mac products that are gathering dust on their shelves must be reminded that their products are largely powerless when it comes to preventing targeted attacks. There is no generic formula for preventing targeted espionage, and there is certainly no single product that can guarantee safety. The best approach is a staggered defense strategy on multiple levels. Ultimately, however, it is almost unavoidable that such attacks will eventually be successful, and potential victims should prepare themselves to ensure that attacks are detected in time and responded to appropriately. However, there is no generic formula for these preparations either.






« Northern lights put on quite a show in Iceland · Macs in the crosshairs · Anti-cyber threat alliance formed in the UK »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2013 » Macs in the crosshairs

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition