thewayne: (Cyranose)
Mac users are familiar with Spotlight. Most users might be familiar with web bugs, they're an invisible 1 pixel square graphic in an email that loads from a server that identifies you as a user and your ISP's IP address when you open an email (that's how you get email messages pleading 'Please don't go away!' from companies). In a nutshell, apparently there's a weakness that can be exploited to let someone search all of your Apple Mail emails remotely.

Solution? Two come to mind. First, go in to Preferences/Spotlight and turn off the ability for Spotlight to search your mail. Second, don't use Apple Mail. And it's always a good idea to have a firewall between you and the internet, but that's not an easy proposition to manage.

Google translation from the German site Heise.de:
http://translate.google.com/translate?hl=en&sl=de&tl=en&u=http%3A%2F%2Fwww.heise.de%2Fsecurity%2F
thewayne: (Cyranose)
First, Apple. Today they released a patch for OS-X to fix Bash, the question is how complete is the patch. Everything that I've heard thus far is that the patches for various *nix distros are partial and that a further patch will be required. So I don't know where that stands. I was not able to find the patch in Mac's Update service, but the direct links in the article worked fine. No computer restart required.

http://krebsonsecurity.com/2014/09/apple-releases-patches-for-shellshock-bug/


Now, Jimmy John's sandwich shop hack. 216 JJ's were compromised, the number of cards stolen is not mentioned in the article. Here's the problems, and I'm using the plural purposely. First, it was a service vendor, Signature Systems, that was compromised, so another 100 mostly mom & pop operations were also affected. They're spread all over the USA, no significant geographic clumping.

But the fun doesn't end there, oh no! Anyone who processes credit cards has to be certified to be PCI-compliant, there are different levels of certification depending on how what your credit card volume is. The auditor company who certified Signature Systems is the only auditor to have their accreditation CANCELLED by the processing card industry.

But wait, there's more! In addition to the auditor losing their certification and going out of business, one model of cash register system installed by Signature Systems was not certified as of late October 2013, and many systems were installed after that date! Even though lawsuits would be flying around regardless, these are going to be interesting because clearly Signature Systems was grossly negligent.

http://krebsonsecurity.com/2014/09/signature-systems-breach-expands/


And finally, my wife and I had an interesting experience in Las Cruces last week. While we were in town, every time I used my card on my wife's account, it was declined. We called the bank and we had a very healthy balance in the account, unfortunately my wife left her wallet at home, so we had to use my cards. Fortunately my account's card worked fine. We thought maybe it was because we were 100 miles from home, but we're frequently in 'Cruces, so it was odd. When we got back to Alamogordo that night, it was declined yet again at a bookstore (three Eric Clapton CDs). As it happened, the clerk also worked at the issuing bank, and she said a whole bunch of cards had been cancelled because of the Home Depot breech. Checked my mail the next day and there was a brand new, bright shiny card. The old one met the shredder. I got my Amazon account reconfigured, received a text message from DirecTV and got them reconfigured, and I think I'm now good.
thewayne: (Default)
They've been available for Windows platforms for several years now, so it was kind of inevitable that one would eventually be made for OS-X. It basically makes it easy for griefers to make trojans, presumably for botnet and similar things. It runs on Windows but has the option of generating binaries for OS-X. And here's some more joy: ""The kit is being sold under the name Weyland-Yutani BOT and it is the first of its kind to hit the Mac OS platform. Basically it's a GUI point & click interface to create payloads that are script kiddie friendly.

Apparently, a dedicated iPad and Linux release are under preparation as well. The Weyland-Yutani BOT supports web injects and form grabbing in Firefox; however both Chrome and Safari will soon follow. The webinjects templates are identical to the ones used in Zeus and Spyeye."
"

https://threatpost.com/en_us/blogs/crimeware-kit-emerges-mac-os-x-050211

There's also some fake Mac antivirus stuff going around: http://blog.intego.com/2011/05/02/intego-security-memo-macdefender-fake-antivirus/

http://apple.slashdot.org/story/11/05/02/2120203/OS-X-Crimeware-Kit-Emerges

At this point, the danger is if you open and run the payload, so once again, smarts is what will mostly keep you safe.
thewayne: (Default)
Trojan. No surprise, it was a matter of time. It starts with an email to try to get you to a porn site, when you click on a video it tells you that you don't have the proper codec and gives you the opportunity to download it. Classic social engineering. And apparently very good engineering of the trojan, also. (Slashdot thread)

Leopard Bugs. Again, no surprises. Which is why I'm waiting at least a couple of weeks to install it until a lot of the early bugs are stomped on.
thewayne: (Default)
They had a sale at the campus bookstore last Friday so I went ahead and bought two copies. I'm in no hurry to install it as I've heard reports of incompatibility with Adobe CS3, so I'll wait a bit, maybe I'll do it when we're in Phoenix in case we have problems, the Apple store is only a few miles away. Still, no reason not to read up on a few things.

Tweaking the User Interface

MASSIVE Ars Technica review (15 pages or so of material) (and the Slashdot thread thereof)

First look at installing it

January 2026

S M T W T F S
    1 23
45678910
11121314151617
18192021222324
25262728293031

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 3rd, 2026 07:48 am
Powered by Dreamwidth Studios