Skip to main content

Mac spyware, malware and viruses are trending upward - Be aware

Mac defender Trojan

With last week's release of the Mac Defender Trojan Horse program the incidence of Macintosh-based spyware, malware and viruses is trending upward. All Mac users, myself included, should be on the look out for these nasty programs, but they need not be quite as fearful as Windows users -- at least not yet.

Malware is an all encompassing term used to describe trojan horse program (which try to fool you into taking some action), spyware (which looks to steal your information or take over your computer) and viruses.

Macintosh computers have not been a large target for malware creators, mainly due to the fact that they have been only a small percentage of the computer market. They are not, nor ever have been, immune from malware, though. Back in my days as an IT staffer back in the early 90's we were plagued with, thankfully benign, yet troublesome Mac viruses such as nVir and wDEF.

That said, Mac user have had a decades long reprieve from malware attacks, compared to the horrible state of Windows malware. Even today, I do not yet feel the need to run an anti-malware program on my Macs, but that time could be coming to an end. As I advise all of my clients, you need to be aware of and on the lookout for, malware that might start to attack the Mac platform.

As of today there are few pieces of Mac malware that can infect you on their own. Mac Defender is a trojan horse program that requires you to take the action of installing it. While there are security holes found every day, many of them are patched quite rapidly. That said, no amount of patches or even an anti-malware program can protect us against ourselves. If you decide to install a program that is a Trojan Horse, you are giving that program full rights to your computer. This is why it is so important to not install software on a whim. Make sure you know what you are installing BEFORE you press the button. Dealing with the aftereffects of an infection is always much, much worse.

So, as I have advised for years, practice "safe computing". Be aware of the threats out there, but don't panic. I'll make a point of posting here in TechnologyIQ when new threats appear so you can be as informed as possible.

More information on Mac Defender Trojan Horse

Comments

Popular posts from this blog

Elsewhere Online: AT&T's Spam Filter Gets A Bit Too Aggressive

This story from TechDirt lays out yet another reason I recommend that folks DON'T use the email provided to them by their ISP. My typical recommendation right now is to get a Gmail account instead. It also points out why I want to manage all my SPAM on my end, without pre-filtering from an ISP. I will gladly manage my spam if it helps to insure that I see as many of my "real" messages as possible. Again, Gmail's tools work pretty good in this regard. Having an alternative email account also insures you will keep the same email, even if you decide to leave your current ISP. Witness all the folks holding onto AOL accounts just to keep their AOL email address. Thank goodness at least that is free now. AT&T's Spam Filter Gets A Bit Too Aggressive You can certainly understand why ISPs offer spam filters. It's a service for users who don't want to be totally bombarded with spam. But what I've never understood is that these ISPs rarely give the user a

On my iPhone…IFTTT (If This Then That) for iOS

IFTTT (If This Then That) for iOS IFTTT (If This Then That) for iOS My best description of IFTTT, both their main web site, and this new iOS app is "a scripting language for the We." It allows you to set up "recipes" that watch one particular service, like Feedly, Evernote, Gmail and more, and then take action on another service whenever a particular action occurs. I use this to automatically save my shared items from Feedly and elsewhere into an Evernote Notebook and also use it to post automatically post information on a variety of services. The iOS app adds to this functionality by allowing you to take various actions on your phone and triggering IFTTT actions whenever they occur. In the case of the iPhone, initiating actions can include adding new contacts to your iPhone, taking a new picture and more.  For more complete information on how IFFTT works, visit ifttt.com    From the iTunes App Store... " Put the internet to work for you. IFTTT lets y

Noted: 6 Ways to Repair Broken Plastic

Read 6 Ways to Repair Broken Plastic via MAKE: Blog An interesting link found among my daily reading