Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    Mac Rogue AV, Defense Contractors, Phishing Lead Week’s Security News

    Written by

    Fahmida Y. Rashid
    Published June 4, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      May 2011 is the month Apple and its legion of Mac users were forced to acknowledge that there was nothing natively secure about the Mac OS X when it came to malware. In response, Apple rolled out its promised MacDefender removal tool this week.

      The tool was actually an updated File Quarantine, a little known feature in Snow Leopard, which works in ways similar to an antivirus application. File Quarantine lists all the file definitions of what software should not be allowed on the Mac, and Apple tweaked it so that it can automatically update its definitions once a day. Sounds like an antivirus package.

      The thing is, cyber-criminals are, if nothing else, quick to adapt. Less than 12 hours after Apple released the removal tool, there was a new MacDefender variant that could get through File Quarantine. Apple updated the definitions. And yet another version came out Friday. Apple countered with a yet another update.

      It’s a game of cat and mouse, and right now Apple is just trying to keep up.

      Speaking of cat and mouse, the developers behind the Android malware DroidDream were back this week with a new version, dubbed DroidDream Light. Despite the name, there was nothing “less” about the damage this particular variant could cause. Google immediately removed 26 apps from its official Android Market containing the malware. For the most part, the apps were all copies of legitimate apps that had the malicious code grafted on.

      Web-based e-mail services also came under attack. Google claimed several of its high-profile Gmail user accounts, including those of government officials, had been hit by a successful phishing attack. The company claimed the attacks originated from China, even though the country vehemently denied it. Trend Micro noticed that similar phishing attacks had hit several Hotmail and Yahoo Mail accounts recently, as well.

      The scariest-attack-of-the-week award actually goes to those unknown cyber-attackers that apparently breached networks of not one, but three, major defense contractors towards the end of May. Lockheed Martin, L-3 Communications and Northrop Grumman all shut down remote access to their networks without warning. Apparently, attackers used cloned SecurID tokens to trick the networks into letting them logon to the network remotely.

      There’s been a lot of debate over what exactly was stolen from RSA Security and whether that meant SecurID was compromised. While RSA Security is still not publicly discussing what was stolen, it does seem that if defense contractors were compromised, then relying on SecurID for the enterprise’s two-factor authentication needs might not be the best security decision to make.

      To be fair, it’s not really clear whether Northrop Grumman was compromised using SecurID.

      Next week, companies descend on New York City for Cloud Expo. A lot of cloud security announcements are expected to come out of the show. This will occur just in time, according to a McAfee and Brocade report released this week because organizations are beginning to think about virtualization-specific security technology to defend their cloud applications and infrastructure. Approximately 26 percent were the most worried about targeted attacks against their virtualized infrastructure and 24 percent said security breaches were their biggest concern.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×