So, Apple released a Java VM update that disables Java. And then re-disables it if the user actually wants to use it. I thought the Java JRE 6_31 build closed the security hole, so why would Apple need to lock down Java?
Usually the phrase you're quoting is proceeded by "the first thing you should do on any new installation is to turn off Windows Firewall. It doesn't do anything, and just bothers you all the time".
So, Apple released a Java VM update that disables Java. And then re-disables it if the user actually wants to use it. I thought the Java JRE 6_31 build closed the security hole, so why would Apple need to lock down Java?
I heard that Apple stopped producing their own versions of java? is that true?
While it might have been related, there in fact was a security update for Adobe Reader a couple of days ago, and that prompt to notify you of it and install it might have just coincided with the Apple update check. Here's the Adobe Reader update info: http://www.esecurityplanet.com/patches/adobe-releases-security-updates-for-reader-acrobat.html.Ran that Russian site test, found no malware.
When I got the Apple software update message, the Adobe Reader update popped up behind it. I selected "remind me later" and it disappeared like it should, but the Apple update failed due to possible corruption, according to the window.
The second attempt did not activate the Adobe message and was successful. It found and deleted the malware. Yikes.
Now I can get Google sites like maps, etc, something that used to bring up that Error 303 message and only worked with Firefox.
Maybe that Adobe update was a last ditch effort to squirm in? Very suspicious.
Anyone else experience this pattern?
Ran that Russian site test, found no malware.
When I got the Apple software update message, the Adobe Reader update popped up behind it. I selected "remind me later" and it disappeared like it should, but the Apple update failed due to possible corruption, according to the window.
The second attempt did not activate the Adobe message and was successful. It found and deleted the malware. Yikes.
Now I can get Google sites like maps, etc, something that used to bring up that Error 303 message and only worked with Firefox.
Maybe that Adobe update was a last ditch effort to squirm in? Very suspicious.
Anyone else experience this pattern?
I had the malware, did that cause Safari to close every 30 minutes?![]()
I bet there are far more users of this type than you'd think. Not every mac user is an 'enthusiast.'
Before making statements like this, perhaps you should look at the current release of Windows.
Very few ports are open by default.
I got this trojan through the Java vulnerability. It infected my Mac Pro. I was not aware of it until I read the news stories about it last week. I removed it, and found parts of it had infected two other files on my Mac. Thanks to Little Snitch that was recommended to me after I was infected, which found these variants still "lurking."
I am glad to have gotten rid of it... I will install this update just to be sure it is all gone.
Haha, I cant resist! - I know, enthusiasts build their own PC's!
Yes, typically Apple takes several hours to post the standalone installer at their support website (support.apple.com).
In any case, here is the page with the link...
http://support.apple.com/kb/DL1515
Do you have Java installed? Have you looked in the /Applications/Utilities folder?
Well that was short lived, if only mswindows was this simple...
![]()
It's not irrelevant. If it's removed, it's no longer part of the botnet. There is no way for any "update" to reinstall the malware once it's removed.That's irrelevant. It's part of a botnet, which means an update could be spread to all infected macs to grant it that ability to kill processes.
I also got this pop up, even after having checked via Terminal if I had been infected as various blogs suggested. Terminal showed nothing.
Me too, strange.