First, I wouldn't trust McAfee to guard my coffee cup! There are several more reliable antivirus apps for Windows. You can find several suggestions here:Mcafee never even seen the malware after several searches. It was $80 a year for nothing.
To run Windows apps on your Mac, you need to install Windows via Boot Camp or use Parallels or VMware Fusion.I am trying to get his next purchase to be a Mac, but he needs one app that is Windows only.
I think you already know the answer to that. Any porn site is considered a higher risk.Is ... a shady site?
I may have missed it but I will ask anyway.
1. Is this malware the first one to not require any user interaction at all on OSX? From what I read it just installs itself and is considered a drive by download through an exploit in Java.
2. What exactly is the payload? I am guessing it gets passwords and such?
Multiple vulnerabilities exist in Java 1.6.0_29, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user.
No, it doesn't. It would appear that something is wrong with the permissions of /Applications on your system. On both 10.6 and 10.7 an admin account has write privileges for /Applications; there's no reason you should be getting an authentication dialog when trying to write to it from such--only from a user account.
I haven't tested it on Lion, but logged in as an admin user on Leopard, it doesn't ask for a password. On multiple Macs running Snow Leopard, it does.
This might help.
It is not the permissions of the Applications folder that is different post-leopard.
After leopard, the default apps in OS X are only modifiable with system level privileges. Safari is not modifiable by admin user without password authentication.
But in leopard and prior, folders that are critical to effectively hooking into the default apps for malicious purposes are only modifiable with system level privileges. This is why Leap-a required users to be running as root.
It must be noted though that some third party applications (e.g. Firefox, and in general anything installed via drag & drop) can be modified by default without asking admin credentials even in recent Mac OS X versions (I'm testing now in Snow Leopard, but I think it's the same in Lion). This is something to be expected, as the philosophy of this kind of installation is that the user is in charge of everything, including security. If one wants to be prompted, permissions should be manually set for the application, or the application should be used with a different user than the one who installed it.
Just launch Terminal and then copy and paste:
defaults read /Applications/Safari.app/Contents/Info LSEnvironment
into the window and then press return.
If it says:
The domain/default pair of (/Applications/Safari.app/Contents/Info, LSEnvironment) does not exist
then copy and paste:
defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
into the window of Terminal and hit return.
If you see:
The domain/default pair of (/Users/joe/.MacOSX/environment, DYLD_INSERT_LIBRARIES) does not exist
Then you know you are clean.
It's not as daunting as it sounds, really...
Could it be that Mac Users have been grossly mislead by Apple?
Here's a few different writers take on it.
Apple malware flourishes in a culture of denial
http://is.gd/d0u7d6
Security industry insiders have long known the Mac platform has its holes. The Flashback Trojan is the first in-the-wild issue that's confirmed this, and big-time. More will follow unless Apple steps up its game.
http://is.gd/LSRB7a
All right, Mac users the day of reckoning has come.
Thanks to a well-documented flaw that Apple didn't patch for three months, a nasty piece of malware called Mac Flashback seems to have infected nearly 600,000 Macs worldwide
http://is.gd/rG3gnx
Flashback Trojan dates back to February, but Apple did not release a patch until April 3. As a result, approximately 550,000 Macs were infected
http://is.gd/tiU1Td
Sorokin noted that 274 of the infected Macs were found in Cupertino, Calif., where Apple keeps its headquarters.
http://is.gd/0FzBvD
Have you been put off by the work required to see if your machine is one of the unlucky ones infected with a Trojan that's been making the rounds?
http://is.gd/Da0zWn
Checking Safari is adequate if you have the right link. The link you posted is for OSX/Flashback.C. The version being discussed here is OSX/Flashback.I. The newest versions of this trojan target only Safari.These instructions keep being repeated in this thread, but is just checking Safari adequate? Is it not necessary to also check Firefox or other browsers you have used to be sure you don't have an infection involving them, for example:
It was just a matter of time.
Could it be that Mac Users have been grossly mislead by Apple?
Here's a few different writers take on it.
Apple malware flourishes in a culture of denial
http://is.gd/d0u7d6
Security industry insiders have long known the Mac platform has its holes. The Flashback Trojan is the first in-the-wild issue that's confirmed this, and big-time. More will follow unless Apple steps up its game.
http://is.gd/LSRB7a
All right, Mac users the day of reckoning has come.
Thanks to a well-documented flaw that Apple didn't patch for three months, a nasty piece of malware called Mac Flashback seems to have infected nearly 600,000 Macs worldwide
http://is.gd/rG3gnx
Flashback Trojan dates back to February, but Apple did not release a patch until April 3. As a result, approximately 550,000 Macs were infected
http://is.gd/tiU1Td
Sorokin noted that 274 of the infected Macs were found in Cupertino, Calif., where Apple keeps its headquarters.
http://is.gd/0FzBvD
Have you been put off by the work required to see if your machine is one of the unlucky ones infected with a Trojan that's been making the rounds?
http://is.gd/Da0zWn
This isn't a Mac issue though, its java. Silly security insiders.
Wrong - it's an Apple issue. Since 2005, the whole "Mac vs PC" thing has told the average consumer that they never have to worry about viruses. It "just works" propaganda has been very effective at driving up Mac sales 25% every quarter.
We shouldn't worry about viruses. It wasn't a virus. You sound like the scaremongering media.
Makes no difference, virus/malware/trojan. These things are not supposed to ever happen to a Mac because their magical nature.
Wrong - it's an Apple issue. Since 2005, the whole "Mac vs PC" thing has told the average consumer that they never have to worry about viruses. It "just works" propaganda has been very effective at driving up Mac sales 25% every quarter.
Yes, it does make a difference, and no, Macs are not "magical". Only those who are computer-illiterate would believe otherwise. Read the Mac Virus/Malware Info link posted in most malware-related threads, including this one, to learn the difference between viruses, trojans and other forms of malware. Mac has never been immune to malware and no one credible has ever claimed it was malware-free. Trojans have been around for a very long time and are user-avoidable, without the need for antivirus apps. Mac OS X viruses don't exist in the wild, and never have.Makes no difference, virus/malware/trojan. These things are not supposed to ever happen to a Mac because their magical nature.
Yes, it does make a difference, and no, Macs are not "magical". Only those who are computer-illiterate would believe otherwise. Read the Mac Virus/Malware Info link posted in most malware-related threads, including this one, to learn the difference between viruses, trojans and other forms of malware. Mac has never been immune to malware and no one credible has ever claimed it was malware-free. Trojans have been around for a very long time and are user-avoidable, without the need for antivirus apps. Mac OS X viruses don't exist in the wild, and never have.
Wrong, they allways claimed that macs are inmune to Windows virus
This isn't a Mac issue though, its java. Silly security insiders.
1) Several posters rightly pointed out that this being a trojan or a virus is immaterial if you have it. To further that point, it's immaterial to most computers users who are not technically savvy. Their computer has been compromised and that's all that matters.
2) Several posters have suggested that if you don't provide an admin password for elevated install, the worst that happens is that it infects your user account. Um, hello, where is the valuable stuff on your computer? Mine isn't under the WINNT/ directory, and I'm guessing yours isn't under the system/ directory either.