[IS&T Security-FYI] SFYI Newsletter, April 9, 2012

Monique Yeaton myeaton at MIT.EDU
Mon Apr 9 16:33:16 EDT 2012


In this issue:


1. Macs No Longer Malware-Free?

2. Tip: Enable the Firewall on Your Mac

3. The Dangers of Hacking


---------------------------------------------

1. Macs No Longer Malware-Free?

---------------------------------------------


Unless you don't read much news on the Internet, you have likely heard about Flashback<http://asia.cnet.com/crave/flashback-is-the-largest-mac-malware-threat-ever-62214213.htm> (Flashfake), a virus targeting Mac computers specifically using a vulnerability in Java. The malware is estimated to be running on 600,000 machines around the world and is judged to be the largest Mac malware threat ever.


If you're using a Mac computer, be sure to download and apply the patches for Java released by Apple this past week. You can find them through your Software Update utility or on the Apple Downloads<http://support.apple.com/downloads/> website.



--------------------------------------------------

2. Tip: Enable the Firewall on Your Mac

--------------------------------------------------


Mac OS X has a built-in firewall that plays the role of security guard, blocking or denying certain network traffic. The firewall on a Mac is turned off by default. Be careful to configure your firewall <http://kb.mit.edu/confluence/x/FQCKBg> correctly before you turn it on so that you're not blocking network traffic you need, for example FTP traffic. Steps for Snow Leopard<http://www.dummies.com/how-to/content/how-to-use-mac-os-x-snow-leopards-builtin-firewall.html>. Steps for Lion<http://techmix.net/blog/2011/05/24/firewall-on-mac-osx-lion/>.



----------------------------------

3. The Dangers of Hacking

----------------------------------


There are those who engage in hacking and commit fraud for monetary gain. And there are those who hack for the purpose of civil disobedience or to disrupt businesses, such as the group Anonymous. An article posted on NPR: All Tech Considered<http://www.npr.org/blogs/alltechconsidered/2012/04/05/150099660/when-online-hacking-poses-real-world-dangers>, discusses the anonymity of online actions and how this anonymity can lure people to believing their actions online may not have real-world consequences. The author believes the risk has more to do with the kind of technology that is being built into more kinds of networked devices, from factory valves to medical equipment to chips used to track cattle. Food for thought?



===================================================================================

Read all Security FYI Newsletter articles and submit comments online at http://securityfyi.wordpress.com/.

===================================================================================

Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/ist-security-fyi/attachments/20120409/ffa31119/attachment.htm


More information about the ist-security-fyi mailing list