• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
macos malware: myth vs. truth – podcast

MacOS Malware: Myth vs. Truth – Podcast

You are here: Home / Latest Cyber Security Vulnerabilities / MacOS Malware: Myth vs. Truth – Podcast
April 7, 2022

Huntress Labs R&D Director Jamie Levy busts the previous “Macs really don’t get viruses” fantasy and provides tips on how MacOS malware differs and how to guard against it.

Bear in mind individuals adverts with a sneezing man in a match who suggests he’s a Personal computer and to keep away, he’s received that unpleasant virus that’s likely all around? “That’s Alright,” states the younger, hip person in blue jeans: He’s a Mac.

… as if any device that runs code could quite possibly be immune to malware…?

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Boy, was that a stretch.

The untruthiness of the notion that Macs are immune to malware has been proved by various MacOS-focused malwares. Examples include things like Silver Sparrow, the malware able of targeting Apple’s then-new M1 ARM architecture Macs back in February 2021. One more: the variant of the Shlayer Mac OSX malware with highly developed stealth abilities that was noticed in the wild in June 2020, actively employing poisoned Google look for final results in purchase to come across victims.

Do you nonetheless listen to persons say “Oh, I’m on a Mac. I can’t get a virus”?

Jamie Levy, director of R&D at Huntress, just lately hosted one particular of the company’s “Tradecraft Tuesday” webinars, in which she dug into the danger landscape on the MacOS facet of the aisle to consider a seem at which threats are the most unsafe. If you’re however hearing Mac customers swear they are invulnerable, this is the podcast to listen to. … or to get them to listen to.

She dropped by the Threatpost podcast to provide us the highlights of that webinar, including:

  • What malware appears like on MacOS
  • How persistence operates on MacOS, and what it indicates for victims and
  • The severity of the standard threats that prey upon MacOS buyers, and how defenders can guard their consumers and environments from all those threats.

You should see under for a record of MacOS security equipment that Jamie outlined in the exhibit.

You can download the podcast under or hear listed here. For more podcasts, look at out Threatpost’s podcast internet site.

Instruments to Guard MacOS

These are the applications to guard MacOS that Jamie proposed all through the podcast:

  • Apple’s Gatekeeper, Notarization, and XProtect: Change on Apple’s individual MacOS resources to recognize and block malware.
  • Lulu: A free, open firewall for Macs from Objective-See that Jamie recommends as a supplement to the default firewall in MacOS.
  • Little Snitch: A host-based application firewall for macOS from Aim Advancement Application GmbH, Little Snitch can be utilized to watch apps, blocking or permitting them to link to hooked up networks by means of advanced procedures. Jamie mentioned it’s generally like Lulu, except “maybe it is a tiny a lot more extended.”
  • RansomWhere: A tool from Aim-See that regularly screens the file procedure for the generation of encrypted information by suspicious procedures in buy to protect personalized files from ransomware.
  • BlockBlock: An additional software from Objective-See, BlockBlock displays widespread persistence spots and alerts each time a persistent part is added.

Transferring to the cloud? Find out rising cloud-security threats along with solid tips for how to protect your belongings with our Cost-free downloadable Book, “Cloud Security: The Forecast for 2022.” We investigate organizations’ top dangers and problems, very best tactics for defense, and assistance for security results in these types of a dynamic computing natural environment, which includes helpful checklists.


Some areas of this report are sourced from:
threatpost.com

Previous Post: «into the breach: breaking down 3 saas app cyber attacks Into the Breach: Breaking Down 3 SaaS App Cyber Attacks in 2022
Next Post: #ISC2Events: A DPO’s Guide to Delivering a Cybersecurity Awareness Program Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.