%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240513061230+00'00') /ModDate (D:20240513061230+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R 13 0 R 15 0 R 17 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 2058 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 433.162 521.469 313.572 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 433.537 520.719 312.822 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(FIRST RANSOMWARE TARGETING APPLE MAC USERS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Ransomware, one of the fastest-growing cyber threats, encrypts data on infected machines, then asks users to pay )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data \(more previous )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(ramsomware articles )] TJ ET 0.373 0.169 0.255 rg BT 146.525 542.055 Td /F3 9.0 Tf [(on our blog)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 146.525 540.904 m 191.552 540.904 l S 0.400 0.400 0.400 rg BT 191.552 542.055 Td /F3 9.0 Tf [(\).)] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(The "KeRanger" ransomware, which appeared last week, was the first functioning ransomware attacking Apple's Mac )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(computers.)] TJ ET 0.400 0.404 0.400 rg BT 61.016 491.088 Td /F3 9.0 Tf [(Read more on the new Mac ransomware)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 489.937 m 223.574 489.937 l S 0.400 0.400 0.400 rg BT 223.574 491.088 Td /F3 9.0 Tf [(.)] TJ ET BT 61.016 471.099 Td /F3 9.0 Tf [(If you have any enquiries or need assistance, please contact us at )] TJ ET 0.373 0.169 0.255 rg BT 326.660 471.099 Td /F3 9.0 Tf [(helpinfo@sun.ac.za.)] TJ ET 0.18 w 0 J [ ] 0 d 326.660 469.948 m 408.335 469.948 l S 0.400 0.400 0.400 rg BT 61.016 451.110 Td /F3 9.0 Tf [(Posted in:Security,Students | Tagged:Apple,Mac,Ransomware | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 146.5247 541.2226 191.5517 550.3801 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/?s=ransomware) >> endobj 13 0 obj << /Type /Annot /Subtype /Link /A 14 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 499.8793 61.0157 499.8793 ] >> endobj 14 0 obj << /Type /Action /S /URI /URI (http://www.reuters.com/article/us-apple-ransomware-idUSKCN0W80VX) >> endobj 15 0 obj << /Type /Annot /Subtype /Link /A 16 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 490.2556 223.5737 499.4131 ] >> endobj 16 0 obj << /Type /Action /S /URI /URI (http://www.reuters.com/article/us-apple-ransomware-idUSKCN0W80VX) >> endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 326.6597 470.2666 408.3347 479.4241 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (mailto:helpinfo@sun.ac.za) >> endobj xref 0 19 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000294 00000 n 0000000323 00000 n 0000000458 00000 n 0000000561 00000 n 0000002671 00000 n 0000002783 00000 n 0000002890 00000 n 0000003006 00000 n 0000003134 00000 n 0000003225 00000 n 0000003351 00000 n 0000003467 00000 n 0000003594 00000 n 0000003710 00000 n 0000003838 00000 n trailer << /Size 19 /Root 1 0 R /Info 5 0 R >> startxref 3915 %%EOF Mac « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Mac

First ransomware targeting Apple Mac users

Tuesday, March 8th, 2016

Ransomware, one of the fastest-growing cyber threats, encrypts data on infected machines, then asks users to pay ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data (more previous ramsomware articles on our blog).

The “KeRanger” ransomware, which appeared last week, was the first functioning ransomware attacking Apple’s Mac computers.

Read more on the new Mac ransomware.

If you have any enquiries or need assistance, please contact us at helpinfo@sun.ac.za.

Keep your Apple safe from worms

Friday, June 27th, 2014

With the rampant “success” of the Flashback Trojan, it’s fair to assume that more viruses, malware, and other nasties will find their way onto the Apple platform. This means it’s up to you to keep yourself educated and your system secure.

Java (not your morning fix)

All of the 700,000+ Apple computers infected with the Flashback Trojan have one thing in common: They’re all running out-of-date versions of the Java browser add-on. Since software updates on Macs are a manual process, updates to tools like Java have to be rolled out by Apple itself. The easiest way to get around this problem is simply to turn off Java from within the Safari browser, an option available under Security in the Preferences menu. You can also turn the service off on your computer as a whole. Head to Applications > Utilities, and uncheck the Java versions listed in the General tab. 

Keep your Mac up-to-date

On this subject of updates, make sure your machine is running the latest versions of OSX and Safari. Apple takes pride in updating its Operating System and it’s also good practice to protect your machine by running the Software Updates regularly. Make it a rule to run the updates once a week. Make sure all the available patches and updates are installed rather than just downloading them. To check for updates click on the Apple Icon in the upper left corner of the screen and select “Software Update”. 

Use strong password

Create a password that are at least eight characters in length, using both letters and numbers, and use at least on capital letter or symbol to make it more secure. Remember to user different passwords for different service. 

Turn Off automatic logins

What good is a strong password if you don’t use it? Even though it’s a pain to have to re-enter all of your passwords every time you boot up your machine, log in to your account, open messenger programs, or access various websites, it really is the safest option. Otherwise, if someone accesses your machine while you not around they’ll have automatic access to all of your content. It just means a few extra keystrokes, but it will make all your data more secure. 

Use a password Manager 

There is a way to avoid constantly having to re-enter your passwords, and that is to use a password manager like Keychain, comes free with current versions of Mac OSX.

To use a password manager, you’ll be asked to create a unique, strong passphrase and store that in your keychain, rather than trying to remember shorter, easier but more numerous passwords. This system is also very handy when you vary your passwords, as you should! 

Prepare your Firewall 

Mac OS X has a built-in firewall that can be used to prevent unauthorized users or programs from accessing your machine remotely. Make sure it’s turned on, or all of your security procedures will be as useless. While there will be a brief learning curve teaching the firewall to play nice with any non-Apple programs you may want to use, it’s a small inconvenience that more than makes up for that in terms of peace of mind. 

Turn off “Open safe files” 

This one is a bit of a headache from long ago when certain file types were unlikely to harbour viruses or malware. Unfortunately, hackers and technology have progressed, meaning that “safe files” are a thing of the past. All sorts of malware can be tucked inside even the most unassuming files. Even the once-innocuous MP3, .jpg, PDF and .doc files are all capable of harbouring code designed to attack your Mac. To change this troublesome setting, go to Safari Preferences > General, and uncheck “Open safe files.” Remember, don’t click links in emails or open unexpected email attachments. 

Stop sharing 

The sharing systems, including Bluetooth and Airport, can leave your machine vulnerable (they are designed to allow remote access to your computer), so when you’re not using them, turn them off! 

Download from Trusted Sources 

Pirated software, cracks, and other illegal downloads are frequently used to distribute malware and viruses, infecting your machine as soon as you access the file. Make sure that you download software, applications, media, and other files directly from the source to minimize your risk of infection. 

Update all the “other” things 

Adobe Reader is another application that you should update and keep updated. It’s a favourite of Windows-based cyber-criminals, and the jump to Mac is anticipated sooner rather than later. The software is among the most exploited in the world, but each new version introduces security enhancements which make it better than the last. 

Install good security systems 

You may have heard that Macs simply do not get viruses, the recent Flashback Malware illustrates otherwise. Now, Mac-flavoured virus scanners are no longer as useless as they may have once seemed. Applications like ClamXav, Virus Barrier, and the Mac-friendly versions of Sophos and Kaspersky Anti-Virus have been designed specifically for Mac OS X. While at this stage, they tend to only find PC viruses or the occasional spam phishing email or tracking cookie. Soon Mac-specific malware will start popping up in greater profusion.

As we mentioned previously, make sure you check what you’re downloading! Mac anti-virus programs are all over the place, so only grab software from legitimate sources. 

Use your common sense 

Most of the worms looking to crawl into your Apple are preying on unsuspecting users and outdated software — a deadly combination at the best of times. Follow these measures and you’re less likely to end up with a rotten Apple.

[ARTICLE BY REGAN JANARI, IT APPLE TECH SUPPORT]

 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.