Park Your Virus Impervious Smugness Mac (and Linux) Users



Screenshot of ClamTk 3.08 running on Ubuntu 8....

Image via Wikipedia

I use linux. I prefer it over Windows for many reasons. It’s more resistant to viruses, less of a target, but that doesn’t mean that malware or other viruses are impossible. If someone were to trick me into running something and even worse, trick me into using my administrator password to install something system wide, it could be the same end result as a windows malware infection. To be fair Microsoft has improved their security over the years. They are still the most likely platform though to get a drive by virus just by visiting a site (with no user interaction.) That much said, Mac users and Linux users should avoid being smug. Why? They aren’t completely safe. No one is. Social engineering is the most common (and most effective) path to getting malware on a computer.


I’ve done computer service for a number of years. Mostly small groups, home users, small businesses. But sometimes at larger organizations. It has many times amazed me that people let me at their computer by explaining that I’m there to look at the computers and _________ sent me back. I many times remember Face from the A-team…. “Hi I’m billy bob and this is my assistant sparky – we had a trouble ticket filed about the _______ and need to check out your workstation.” I can’t think of any time that I ran into someone new that wanted to call and check with someone else. Not once in ~15 years.

Recently there’s news of Mac Shield a malware for the mac that resembles rogue antivirus software on windows. Apparently a popup appears claiming that your mac has an infection and your administrator password is needed to remove it. Once it receives the administrator password…. game over you NOW have malware and it’s going to serve up illicit content over a public webserver, it’s going to collect passwords, bank account logins, credit card numbers and who knows what else on your nice secure smug mac.

The key learning moment here should be that it’s the user that was vulnerable – not the system!

Smugness should step aside.

Now, if you’re a mid size company that hires outside computer help – do you have a procedure for making sure that the person showing up is who they say they are? if you are large enough for an in house it department – are there name tags and ways to know that this guy that says he’s “the new guy” in IT really IS with your company?

Unfortunately in most organizations you can’t have a quick look from an IT person everytime you have a popup claiming that you have a virus. So, it’s important to become familiar with the legitimate popups of your antivirus software so you can discern better what is authentic and what isn’t. Sorry, but even that is no silver bullet. The malware writers are clever and who knows they may find a way to mimic whatever is preinstalled on the system for antivirus.

Related Posts

Blog Traffic Exchange Related Posts
  • WPA and WPA2 cracked 100 times faster The days of relying on WPA or WPA2 as your online layer of wireless security may be numbered. A new technique that makes use of NVIDIA's newer GPU's to do some of hte processing means that it's possible to break "forgotten" keys about 100 times faster than was previously possible.......
  • Microsoft's quick response to network worms.... This is an ironic title because frankly, Microsoft has seemed to be slow in solutions for the recent zotob worm. Of course, they announced the vulnerability and accompanying update to solve the issue to begin with, but after the virus started propagating what do we see from Microsoft? They have......
  • ZDNET.uk takes a look at linux on the business desktop It was nice to see linux on the business desktop getting a serious look at zdnet.uk It looks like they give a fair run down of the main business class applications (Office Suite/email/etc.) While pointing out that the installers were something that in a business environment IT staff would be......
Blog Traffic Exchange Related Websites
  • How do I boot into Safe Mode? If you are fighting a virus/malware on your computer, it is best to boot in safe mode before you start removing things and running scans.  If you don't, it is likely that the malware will likely just re-install itself.  I'm not going to go into a whole tutorial on virus......
  • World Wide Web Security Essentials Is Not A Real Spyware Remover. It Resembles The Functions And Looks World wide web Security Essentials is not a real spyware remover. It resembles the functions and looks of genuine spyware removal software but has no capacity to eliminate any virus, trojan or malware. Web Security Essentials is the newest addition to the growing list of rogue Antivirus programs. Internet Security......
  • WebOS to get Adobe Flash in less than 45 Days It looks like WebOS will be first mobile operating system to support Adobe Flash - and it's coming quickly. Adobe says: A prerelease version of Flash Player 10.1 is now available for Windows, Macintosh and Linux operating systems. A beta is expected to be available for Palm webOS later this......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site