So Macs can be infected with malware. Who would have ever thought? The malware at issue here is the dreaded ransomware. Ransomware scrambles up your files, and the hacker at the helm says he’ll give you the cyber “key” in exchange for a handsome payment.
Ransomware historically has primarily impacted Windows users, but recently it got into OS X—its latest version, Transmission.
- The virus cyber-incubates for three days.
- Then with a Tor client, it connects to an Internet server and locks vulnerable files.
- The cyber key costs $400.
- Nevertheless, this attack, which doesn’t happen as easily as, say, being lured into clicking a malicious video, is easily spotted.
- Apple quickly mitigated the problem before anyone’s data had a chance to get encrypted by the virus and held hostage for the bitcoin payment.
- In summary, Macs are not immune to ransomware, but the circumstances under which the user is victimized are unique and rigid.
- To avoid the crush of a ransomware attack, regularly back up your data!
It’s time to take precautionary measures, while at the same time, not allowing anxiety to creep in every time you use your device.
- Be careful when downloading applications.
- Never run apps that are unfamiliar to Apple. Go to System Preferences, then Security and Privacy, then General.
- You will see three safety levels. Now, you should never download an app from a third-party vendor. One of the safety levels is called Mac App Store. If you choose this one, all the apps you get will only come from the Mac app store, meaning they will have been given the green light by Apple.
- To widen the app selection, you can choose Mac App Store with identified developers. This will allow you to get applications created by developers whom Apple has endorsed. However, this doesn’t mean it’s as secure as the Mac App Store choice, because the identified developers’ product was not tested for security by Apple—but at least Apple will block it if it’s infected.
- Never put off tomorrow what you can update today. Download updates the moment you are cued to do so.
- Go into the App Store, hit Updates and then Update All to make sure you’re caught up on updates.
- To avoid this hassle in the future, put your settings on automatic updates: System Preferences, App Store, Download newly available updates in the background.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Ransomware as a Service: A new threat to businesses everywhere
Cyber criminals have been attempting to extort money from individuals and companies for many years, and the latest attempt to take advantage of others is by using Ransomware as a Service, or RaaS. A ransomware virus infects a computer when a user clicks a link and unknowingly download a malicious file. The ransomware virus then encrypts
- Ransomware Hackers provide Customer Service Dept. to Victims
Yes, believe it or not, ransomware has become such a booming business for thieves, that these cyber thugs even provide bona fide customer service departments to guide their victims! When ransomware infects your computer, it holds your files hostage; you can’t access them—until you pay the hacker (usually in bitcoins). Once paid, the crook will give
- Phishing Scammers Target Macs
On Christmas Day, 2011, Apple product users were targeted by a major phishing attack. The Mac Security Blog reported, “A vast phishing attack has broken out, beginning on or around Christmas day, with emails being sent with the subject ‘Apple update your Billing Information.’ These well-crafted emails could fool many new Apple users, especially those who may
- Your Ransomware Response: Prepare for the Worst
A ransomware attack is when your computer gets locked down or your files become inaccessible, and you are informed that in order to regain use of your computer or to receive a cyber key to unlock your files, you must pay a ransom. Typically, cybercriminals request you pay them in bitcoins. The attack begins when you’re lured,
- Beware of Apple ID Phishing Scams
You may have been scammed after you responded to an e-mail that appears it came from Apple. When hackers send e-mails that appear to come from a legitimate company like Apple (or Google, Microsoft, PayPal, etc.), with the objective of tricking the recipient into typing in passwords, usernames, credit card information and other sensitive data,