virus

Latest

  • Kaspersky Anti-Virus Mobile 2.0 arrives in beta

    by 
    Paul Miller
    Paul Miller
    04.15.2006

    If you haven't found an anti-virus solution yet for your Symbian phone, and the mere thought of a piece of malicious code wreaking havoc on your contact list or private pics sends you spiraling into despair, then you might want to give the new Kaspersky Anti-Virus Mobile 2.0 a look-see. Along with your everyday virus blocking, the software works to stop SMS and MMS spam, and can receive regular updates via WAP or HTTP. Currently in beta, the software runs on S60 phones with 6.1, 7.0, 8.0, or 8.1 versions of the OS, but UIQ and Windows Mobile versions should be out for the second beta.

  • MIT researchers use virus to build tiny batteries

    by 
    Paul Miller
    Paul Miller
    04.07.2006

    A small team at MIT has been spending the last few years trying to coax an organism to self-assemble into super thin lithium-ion battery out of tiny "nanowire" structures. The process involves a gene-manipulated version of a common virus which collects cobalt oxide and gold, and then assembles itself as an ultrathin wire on top of thin film. The wires are 6 nanometers in diameter, 880 nanometers in length, and a full fledged battery can be the size of a grain of rice. Once the genes are modified, the researchers say they can easily replicate millions of the wires. While this might sound like a good fit for a B-movie plot, it also sounds like they've managed to develop a rather large jump in battery tech. It looks like the first application for this tech will be for mini batteries like those of hearing aids, but there are hopes this tech can eventually make its way into laptops and perhaps even power electric cars in the future, thanks to its high density and potential for world ending catastrophe.

  • How to take Mac security seriously

    by 
    Victor Agreda Jr
    Victor Agreda Jr
    03.07.2006

    Damien went into detail about the "hacker challenge" story and, as he explained, it's much ado about nothing— for now. Clearly, this Mac security thing is only going to get more important. Even Headline News had a largely exaggerated report on the Bluetooth exploit found a while ago... So what is the average Mac user supposed to do? It's all well and good if you're a sysadmin and you can do stuff like lock down a server, but if you just bought your iBook and you are now cowering in a corner because you're afraid to even open the thing (knowing that you will automatically "catch" something), what then? Read on, as I have some stories and advice for you.First it is important to note that the most likely vector of any computer attack is human. And keep in mind the difference between a vector of attack (like the SSH "hack" mentioned by Damien), and a payload, which would be a true virus or Trojan. A worm is a vector, but it might deploy a payload. Make sense? Anyway, the point is humans are the weakest link in the whole chain, yet also the most important in stopping any attack. It is this central fact that makes almost all OS'es equal in terms of security. You are only as good as the people who use a system, and those who set it up. Case in point: phishing.Phishing is a huge problem, and easy to set up. You get an email claiming some guy is your long-lost relative, and he needs some money to get out of jail. If he gets out, he'll double your money. Or, even easier to trick (but harder to set up) is the fake URL scam, where it looks like Paypal or ebay (common targets) is sending you a letter about your account. This is the true phishing scenario, played out millions of times a day on the internet. Just click on the link to "verify" your account info, or it will be deleted. Unfortunately, the link will take you to a spoofed site, and you'll be typing your sensitive info into a trap designed to steal your passwords and credit card numbers. These are spins on classic grifters' tricks, and phishing scams aren't very well guarded on OS X. Microsoft and Mozilla are trying to attack this problem with tools in their browsers (or in email clients) that will alert you to spoofed websites. So what can you do on OS X? First, check out the US government's guide to avoiding phishing scams. Second, make sure you're using something to filter spam, as this will often catch a lot of generic phishing scams. If you use Firefox, Netcraft has a toolbar that will supposedly guard against phishing, but I haven't tried it. It essentially checks URL's for you. Third, use common sense. Would ebay really send out an email to an account and NOT use their username? Of course, the common sense cure is the hardest one to invoke...One more thing about the human vector: it's all about education. You have to teach people the rules of the road, yes? Well you'll have to educate yourself or others on some basic security precautions, especially if you are the cautious type. One common concept is to never share passwords. Also, most people would recommend you don't use the same password for everything you do. And since we're talking about passwords, don't forget to change them often, and use combos of letters, numbers, and uppercase/lowercase where appropriate. If you want a freeware tool for making passwords, there's Pazzle. With Keychain, I have a bad good habit of just setting a great password, but instantly forgetting it. Let's just hope I back up my Keychain database on a regular basis, eh? Oddly enough, Wayne State has a quick little ditty on setting passwords, and of course Wikipedia has the whole history plus some ideas too. Without exposing my own tricks, I can say that if I have to remember it, I'm more likely to use l33t type spelling for relatively common stuff. Maybe not the most secure in the world, but more secure than "Fluffy" or "PHilton." And did you know OS X includes a password helper, to help create good passwords? It's all here on this Tiger Tips page. Essentially you click the little question mark (or key, as in FileVault it was a question mark, but sometimes it's a key, as in the pic on the Apple page, go standard GUI!) and a tiny dialog pops open to help you make a password. Pretty slick.Tiger introduced a ton of very necessary security features too (aside from the password helper). Stuff most people don't think about is now included, like Kerberos support in VPN, secure virtual memory, and a certificate assistant. A lot of these things are hard to find to the uninitiated, which I guess is good, since most folks won't use them. So instead, let's go over some more basic things you can do to protect yourself (after the jump).

  • Yet Another Pointless Worm(tm): Inqtana.A

    by 
    Dan Pourhadi
    Dan Pourhadi
    02.18.2006

    It's like a leaky dam: It starts with one tiny little hole in the wall, then several more spring through. Before you know it, the whole dam has collapsed and the poor farm town down the road is nothing more than island rooftops and floating cows. What do you think happened to Atlantis, folks?Following the discovery of one of Mac OS X's first "Trojan" worms (wink), Macworld was kind enough to point out another leak in our increasingly porous perimeter: a new proof-of-concept Java worm called Inqtana.A that "exploits a vulnerability in Bluetooth on some Macs that haven’t been updated with Panther and Tiger security patches."I'll leave the gory details for Macworld to explain, but suffice to say that the malware loads onto your Mac, finds another machine via bluetooth and attempts to transfer itself. The user receiving the file does need to accept the transfer -- but it still self-propagates, technically classifying it as a worm. The good news, though, is that it doesn't seem to do much more than that.Frankly, despite the sudden appearance of these proof-of-concept "leaks," I'm still betting that some clever animated superhero will pop a finger into the holes and seal 'em up before the dam bursts and we're forced to start new lives as ruffian mer-people. But there are only so many fingers and toes to go around before a leak's left unattended -- what happens then? Aquacalypse?

  • Symantec offers an update for OSX.Leap.A

    by 
    Dave Caolo
    Dave Caolo
    02.16.2006

    Well, here's something you don't see very often. Symantec has issued an update that offers protection agains OSX.Leap.A, the Mac Trojan Horse that we wrote about earlier. They classify it as a "level 1" on a scale of 1 to 5, so there's no need to slip into panic  mode. It seems to be PPC only, so you lucky Mactel owners have nothing to worry about. Carry on.

  • Possible Mac OS X Trojan Horse (mostly harmless)

    by 
    Damien Barrett
    Damien Barrett
    02.16.2006

    So I saw the news this morning about a possible first trojan horse for Mac OS X and decided I didn't really want to deal with the inevitable ensuing hysteria, flames, and crazy comments that would be sure to follow such a post. It was 8:00am and just way too early to deal. I mean, if I want to read stupid comments about Macs all day long, I'll just spend my time over at Digg.Heh heh..I thought to myself, I'll let some other TUAW staff member post this news story. Then they can deal with the puerility.But now it's almost noon and something like 42 people have sent in a tip and no one's stepped up to the plate, so I figure I probably should write up something.Here's a quick summary:  Someone uploaded a trojan horse to the MacRumors.com forums which claims to be a .tgz archive of screenshots of Apple's upcoming Mac OS X 10.5 Leopard. Problem is that it seems to be a proof-of-concept trojan and isn't very successful at doing what it's supposed to do, which is propagate itself out via your IM buddy list. Andrew Welch, who founded Ambrosia Software (thanks for Apeiron, BTW!), has been doing a bang-up job of dissecting the trojan and has determined that it's mostly harmless. You can read the specifics in the Ambrosia forums. Sophos has already posted a definition for this trojan here.The bottom line is that this really seems to be a proof-of-concept trojan more than an actual "in the wild, self-propagating" virus. So yeah, it's certainly very interesting, but I'm not about to start watching for the sky to fall. Leave that to cartoon birds, storybook characters, and PC magazine columnists.

  • Norton AV for OS X makes a Mac less secure

    by 
    David Chartier
    David Chartier
    12.26.2005

    Ah the beautiful irony: last Tuesday, as many of us were getting ready for family and the holidays, Symantec admitted that a serious security flaw has affected about 40 of their products, including all versions of Norton Anti-Virus (NAV) for OS X. Symantec calls this a 'high risk' vulnerability that could allow a remote user to gain control of a computer, even a Mac, that's running any of their affected software. I haven't seen anything about a solution for either side of the fence yet, so if you're crazy for security I don't envy the dilemma a situation like this might put you in. An up-to-date and patched copy of OS X is widely hailed to be pretty secure these days (so run Software Update - regularly!), but the ZDNet Australia article that we found this in poses the important security question pretty well: "As the owner of a Powerbook I am faced with a dilemma. Do I pay AU$118.15 for a flawed 'security' application that is designed to protect me from threats that do not seem to exist; or do I take sensible precautions like keeping my computer behind a firewall and staying up to date with OS X patches?"No matter which side of the OS X security/virus/malware debate you stand on, a situation like this undeniably brings these topics back into light with a new perspective. Feel free to discuss in the comments, but keep it clean; don't make me come in there and separate you.