Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utili
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Update brings enhanced malware protection for Snow Leopard

May 31 2011

Mac Trojan horses, beware: There's a new sheriff in town, and its name is Security Update 2011-003. Not a very catchy name, to be sure, but it gets the job done--and that job is protecting Mac users from the nefarious Mac Defender Trojan horse, as well as laying the groundwork to keep them safe from future malware as well.

In a knowledge base document posted last week, Apple published details of how to manually remove the Mac Defender Trojan horse, as well as promising to roll out a security update that would deal with the malware in a more automatic fashion.

Security Update 2011-003 is that update. Weighing in at 2.36MB, it requires Mac OS X 10.6.7 and it tackles Mac Defender from three angles.

The first is an addendum to the malware definitions contained in Snow Leopard's built-in File Quarantine malware protection, which specifically identifies the OSX.MacDefender.A variant of the Trojan horse. (My investigation of the definitions file post-update showed that it will also detect the OSX.MacDefender.B variant as well.) While Snow Leopard has contained this anti-malware protection since it shipped in 2009, it contained only two definitions at launch, and has since been updated with just four further pieces of malware (three of which were variants of the same OSX.HellRTS malware).

The second tine of Apple's Trojan-skewering fork aims to beef up Snow Leopard's malware protection by adding support for daily definition updates. This gives Apple the ability to add new definitions in the background, without requiring users to manually download a Security Update. Not only does that avoid users' workflows, but it also makes sure that potentially critical updates don't linger, uninstalled, in Software Update. Users who would rather opt out of the downloads, for whatever reason, can do that: Security Update 2011-003 adds a "Automatically update safe downloads list" item to OS X's Security preference pane; just uncheck that box, and your definitions will remain untouched.

Thirdly, Snow Leopard can now remove the Mac Defender Trojan horse if it's detected on your system. According to Apple, the OS will now check for the malware; if it's found, Snow Leopard will force it to cease and desist, remove any persistent files, and fix any configuration changes the program has made. Once all the damage is repaired, you'll be notified that the malware has been removed.

It's unclear, however, whether those removal abilities will extend to the previous malware included in Snow Leopard's definition list or to future malware. There's also the issue of Mac Defender variants that have already begun to spring up around the Internet, including a particularly nasty version that doesn't require the user to enter an administrative password.

While seeing Apple actively combatting malware is a step in the right direction, its future handling of potential malware outbreaks will bear far more weight. Apple now has the means to quickly and efficiently deliver malware protection to its users, but it remains up to them to make sure that they use it.

Sours From

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html