Ransomware Attacks Target Apple Users Via iCloud

Ransomware Attacks Target Apple Users Via iCloud

A recent rash of ransomware attacks has left some Apple users locked out of their Mac computers and iOS devices. The nature of the attacks led some users to wonder if Apple itself had suffered some kind of hack. The good news is that the situation does not appear to be an Apple hack. The bad news is that hackers have somehow managed to get their hands-on login credentials for some users.

Hackers are attacking users by logging into their iCloud accounts and enabling the “Find My iPhone” function. …

October 27, 2017 • 3 min read
Ransomware Imitation Attempts to Fool iPhone Users

Ransomware Imitation Attempts to Fool iPhone Users

Though the threat of computer viruses once lurked primarily in the domain of email attachments and suspicious file downloads, the current landscape is vastly different. Simply doing damage to a system and spreading a virus further is no longer the biggest threat. From spyware to any of the many flavors of malware, there are many new and evolving security issues facing computer systems globally. Ransomware continues its rise to prevalence as infections rise year over year, compromising more machines. Ransomware, a type of malware which locks down user access to …

September 16, 2016 • 3 min read
NetBarrier Advisory 2000

NetBarrier Advisory 2000

published:    September 09, 2000
vulnerable:    Intego’s NetBarrier (all versions) running on MaCOS

Discussion

Intego software (www.intego.com) offers a security software package for the Macintosh platform. The software is a firewall utility that allows the user to chose between different security schemes (server only, client only, customized, etc) and block different kind of known DoS (pingflood, synflood, ping of death, etc). One way of actually protecting the user from a remote attack such as a pingflood is to allow the user to block the ip from where the attack is performed. The software either …

September 9, 2000 • 4 min read
SuperLock Lite reviewed and rated on SecureMac.com

SuperLock Lite reviewed and rated on SecureMac.com

Information

SuperLock is the premier shareware Macintosh security utility. It has been protecting Macs from casual snoopers since 1993, and it protected Macs for two years before that as a program called MacLauncher (which still works properly on the latest Macs!). It can be found on Macs all over the world belonging to students, teachers, governments, and normal, everyday people.

SuperLock 4.0.2 Lite is a slimmed-down version of SuperLock 4.0 Pro. Whereas SuperLock Pro is intended for settings like school labs where multiple people access one machine, SuperLock Lite is for Macs …

May 2, 2001 • 2 min read
Microsoft Security Bulletin MS01-028 RTF document linked to template can run macros without warning

Microsoft Security Bulletin MS01-028 RTF document linked to template can run macros without warning

Security Bulletin Issued by Microsoft May 21, 2001

The following is the list of vulnerable products:

        Microsoft Word 98 for the Mac
        Microsoft Word 2001 for the Mac

 

Summary

When Microsoft Word opens a RTF (Rich Text Format) file that contains a link to a template, only the RTF file is checked for macros. When a a macro is embedded into the template file that was opened from a link in the RTF file an attacker could set the macro to run automatically and execute commands without your authorization – you even knowing …

May 21, 2001 • 2 min read
StaticUsers.net – DoorStep Firewall

StaticUsers.net – DoorStep Firewall

Information

DoorStop, from Open Door Networks, Inc., is a software-based “firewall” product for Macintosh servers. DoorStop is software that you install directly on the servers which you wish to protect. DoorStop is significantly easier to set up and use than a hardware firewall and provides the same capabilities at lower cost.

With DoorStop, you can specify precisely which machines should have access to which services, and you can keep track of both allowed and denied access attempts to those services. DoorStop works well with a wide range of Macintosh-based Internet servers, including …

June 2, 2001 • 2 min read
OpenSSH for Mac OS X – Installation, How to and Custom Packages

OpenSSH for Mac OS X – Installation, How to and Custom Packages

What is OpenSSH

OpenSSH is a cost free version of the SSH protocol suite. Many of the users who utilize telnet, ftp, rlogin and other programs may not realize that their passwords are transmitted in plain text (unencrypted) across the Internet. The OpenSSH suite encrypts all data that comes to and from your computer including passwords.

The OpenSSH suite includes many functions and programs. SSH replaces rlogin and telnet, sftp replaces the plain ftp program and rcp is replaced with a enhanced scp program.

Luckily enough Apples new operating system, Mac OS X …

June 2, 2001 • 2 min read
IPNetSentry Network Internet Firewall Software

IPNetSentry Network Internet Firewall Software

Information

IPNetSentry is a simple and intelligent security application which protects your Macintosh from outside Internet intruders. This is particularly important for Macintosh users who have cable modem, DSL, or another high-speed Internet service where connections can be maintained and left unattended for hours (or days) at a time.

Unlike most other Internet security products, IPNetSentry does not erect barriers for the safe use of your Internet connection. There is no need to “punch holes” in a firewall for specific applications you may wish to run. Instead, IPNetSentry silently and intelligently watches …

June 2, 2001 • 3 min read
Content Barrier by Intego, Blocking, Censorship,Security, Time Defined Access

Content Barrier by Intego, Blocking, Censorship,Security, Time Defined Access

Information

ContentBarrier offers content control, web filters, parental control and much more. ContentBarrier is made by Intego, the creators of the MacOS firewall NetBarrier. This software is primarily used for two targeted audiences, the parent who want to restrict young children from accessing the uncensored web; And the work place to protect the employer from liability, increase bandwidth and productivity.

Parental Control

If you don’t already know, the web can be a dangerous place because of the freely available content. ContentBarrier has predefined filters that let you choose what you don’t want your …

June 2, 2001 • 4 min read
Snort – Network Intrusion Detection System on Mac OS X

Snort – Network Intrusion Detection System on Mac OS X

Information

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as …

June 2, 2001 • 3 min read
StaticUsers.net – PGP Personal

StaticUsers.net – PGP Personal

Information

PGP Personal Security – 7.0.3 for Macintosh w/RSA – $19.95 USD – Strong, secure, protection for your hard disk, data, and email.. Available in: US or Canada only

Views

Excellent program, for those who remember 6.0.2 was free for a limited time. The current price of the product is 19.95 and you can purchase from mcafee online

Download Version

Download PGP Personal Security – 7.0.3

Features

Information privacy for individuals and businesses.

Secure e-mail and attachments with a single click.
Encrypt data on your hard drive automatically and transparently.
Create self-decrypting files and folders.
Securely “shred” files so they can …

June 2, 2001 • 1 min read
StaticUsers.net – PGP Freeware

StaticUsers.net – PGP Freeware

Information

Privacy means that only the intended recipient of a message can read it. By providing the ability to encrypt messages, PGP provides protection against anyone eavesdropping on the network. Even if the information is intercepted, it is completely unreadable to the snooper. Authentication identifies the origin of the information, certainty that it is authentic, and that it has not been altered. Authentication also provides an extremely valuable tool in network security: verification of the identity of an individual. In addition to secure messaging, PGP also provides secure data storage, enabling …

June 2, 2001 • 4 min read
StaticUsers.net – PowerCrypt

StaticUsers.net – PowerCrypt

Information

PowerCrypt implements the major cryptographic methods, standards and hash algorithms: DES, IDEA, RSA, DSA, PKCS, MD2, MD5. As well, PowerCrypt implements the major secure e-mail protocols: PEM, S/MIME.

PowerCrypt handles standard X 400 certificates:

It stores received new certificates both as a local password protected copy and a public copy in a central Certificate Directory accessible to other users.
It creates new keys and prototype certificates for certificate requests

You can use it to implement a Certification Authority of your own, to certify your own certificates for your work group or friends. i.e. PGP …

June 2, 2001 • 1 min read