Are macs vulnerable??. Or "We've got a problem" 655,700 Apple computers worldwide were hit by the malware and made up the world's largest known botnet.

Slides:



Advertisements
Similar presentations
7 Effective Habits when using the Internet Philip O’Kane 1.
Advertisements

Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 5 Operating Systems. 5 The Operating System When working with multimedia, the operating system is perhaps the most important, the most complex,
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Tim Fredrick March 2010 NCAR/ACD/NESL Computing The Mebroot/Torpig threat UCAR Malware incidents.
LittleOrange Internet Security an Endpoint Security Appliance.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Chapter Nine Maintaining a Computer Part III: Malware.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
How to maintain your computer
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
LO2 Understand the key components used in networking
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
VirtualBox What you need to know to build a Virtual Machine.
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
SPEAKING ‘Information Technology’ ‘Computers’. Make dialogues on a spot, without preparation. Use active vocabulary from the topics ‘Information Technology’
5 SYSTEM SOFTWARE CHAPTER
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Get rid of troubles with Dr.Web CureNET! (Quick Start) If your house is on fire, you call for a fire brigade. When malware ravages through your network,
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
AntiVirusSoftware KASPERSKY LABS. Introduction A computer virus can be very damaging, the best way to protect your computer is to install an Antivirus.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Module 8 : Configuration II Jong S. Bok
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
Anti-virus software is a necessity with computing to not only protect your work or pc but the data on the network / internet.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Jake Horsfield (P3/D1) PURPOSE OF SOFTWARE UTILITIES.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
 Anti-Virus Guard ( AVG ) is a family of anti- virus and Internet security software for the Microsoft Windows, Linux, Mac OS X, and FreeBSD computing.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
WannaCry/WannaCrypt Ransomware
Chapter 5 Operating Systems.
WannaCry/WannaCrypt Ransomware
Introduction:. Vendor : Cisco Certifications : Next-Generation Firewall Express Security Engineer Exam Name : Cisco ASA Express Security Exam Code :
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
Risk of the Internet At Home
Cyber security and Computer Misuse
Presentation transcript:

Are macs vulnerable??

Or "We've got a problem" 655,700 Apple computers worldwide were hit by the malware and made up the world's largest known botnet (a network of zombie computers controlled remotely by intruders) comprised of machines running MacOS X

March 25, 2012 First Flashback botnet domains are registered. March 27, 2012 Doctor Web added the BackDoor.Flashback.39 signature into the virus database used by its Dr.Web for Mac OS X. April 4, 2012 According to data collected by the virus laboratory, the number of infected hosts in the BackDoor.Flashback.39 botnet reached 550,000. Doctor Web issued a press release concerning the BackDoor.Flashback.39 epidemic. April 11, 2012 "Apple is developing software that will detect and remove the Flashback malware"—the statement issued by Apple de facto recognized the reality and scale of the threat. В The number of machines infected by BackDoor.Flashback.39 reached Facts: a chronology of the epidemic

Exploit a Java vulnerability and load an applet from a web-site. How?

Virus writers also make extensive use of phishing and social engineering. How?

Mother, I need money urgently! Do not call, I will call you later.

What shall I do? Mac users can use the free service from Doctor Web at to check whether their computers are infected.

Dr.Web Anti-virus Pro Anti-virus protection for Windows, Mac OS X and Linux Protection components  Anti-virus  Anti-spy  Anti-rootkit  MS Outlook plugin  Dr.Web LinkChecker  Firewall* For Windows only 2 PC/1 year What shall I do?