ICT Security-Sécurité PC et Internet
87.2K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
April 14, 2012 2:31 PM
Scoop.it!

SabPub Mac OS X Backdoor: Java Exploits, Targeted Attacks and Possible APT link

SabPub Mac OS X Backdoor: Java Exploits, Targeted Attacks and Possible APT link | ICT Security-Sécurité PC et Internet | Scoop.it
we can confirm yet another Mac malware in the wild - Backdoor.OSX.SabPub.a being spread through Java exploits. This new threat is a custom OS X backdoor, which appears to have been designed for use in targeted attacks.
No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
April 6, 2012 1:05 PM
Scoop.it!

Flashfake Mac OS X botnet confirmed

Flashfake Mac OS X botnet confirmed | ICT Security-Sécurité PC et Internet | Scoop.it
Igor Soumenkov
Kaspersky Lab Expert

 

Earlier this week, Dr. Web reported the discovery of a Mac OS X botnet Flashback (Flashfake). According to their information, the estimated size of this botnet is more than 500, 000 infected Mac machines.

 

Our logs indicate that a total of 600 000+ unique bots connected to our server in less than 24 hours. They used a total of 620 000+ external IP addresses.

 

More than 50% of the bots connected from the United States.

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
April 10, 2012 7:25 AM
Scoop.it!

Flashfake Removal Tool and online-checking site

Flashfake Removal Tool and online-checking site | ICT Security-Sécurité PC et Internet | Scoop.it
After intercepting one of the domain names used by the Flashback/Flashfake Mac Trojan and setting up a special sinkhole server last Friday, we managed to gather stats on the scale and geographic distribution of the related botnet.
No comment yet.