It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
A virus infecting Macintosh computers is picking Google's pocket by hijacking advertising "clicks," tallying as much as $10,000 daily, according to Internet security firm Symantec.
A component of the widespread Flashback virus targets Google search queries made using Chrome, Safari or Firefox browsers and directs people to pages dictated by the hackers, Symantec said Tuesday in a blog post.
A component of the widespread Flashback virus targets Google search queries made using Chrome, Safari or Firefox browsers and directs people to pages dictated by the hackers, Symantec said Tuesday in a blog post.
Originally posted by Esotericizm
...Although just FYI mac has never been immune to virus infection and malware it just isnt as prominent as most hackers target windows due to its superior user base. Same goes with linux, The backdoors and virus do certainly exist its just that windows owns the larger market share and as such has many many many more "targets"
Originally posted by Klassified
Originally posted by Esotericizm
...Although just FYI mac has never been immune to virus infection and malware it just isnt as prominent as most hackers target windows due to its superior user base. Same goes with linux, The backdoors and virus do certainly exist its just that windows owns the larger market share and as such has many many many more "targets"
Well said. And true. I have explained this to many Mac users.
I'm sure its just a coincidence that not long after Steve Jobs dies ... Macs finally get a virus
Also to note, anyone with a little IT experience will tell you that any published OS is designed to be riddled with holes, by which the manufacturer and associated organizations can rip data right out of your connection port
Originally posted by Aim64C
(such as embedding themselves into .jpg files
You got my attention with that, never heard of an infected jpg, how is the code executed?
The virus, known as W32/Perrun-A, was sent directly to the anti-virus community by its author and is considered to be a "proof of concept". It spreads in the form of a traditional Win32 executable virus (usually called proof.exe), making changes to the Registry to mean that JPEG (.JPG) graphic files are examined by an extractor (called EXTRK.EXE) before they can be viewed. If the extractor finds viral code inside the graphic file it is executed.
A proof-of-concept exploit which executes code on the victim's computer when opening a JPG file was posted to a public
website on September 17th, 2004. That exploit only crashed the Internet Explorer web browser.
On September 24th, a constructor appeared that could produce JPG files with the MS04-028 exploit. This time the exploit
executed a code that could download and run a file from Internet. However, the JPG file with the exploit has to be previewed locally for the exploit to get activated; viewing a JPG file from a remote host does not activate the exploit.
On October 12th, 2004, Microsoft released several critical updates for Windows, Exchange and Office, as well as an update for the patch of the JPG vulnerability (MS04-028). Further information and a complete list of updates is available at Microsoft's TechNet Security site: