{"id":406,"date":"2011-05-03T11:09:39","date_gmt":"2011-05-03T15:09:39","guid":{"rendered":"http:\/\/mikemartinezonline.com\/blog\/2011\/05\/03\/new-mac-trojan-horse-and-security-tips-from-the-nsa\/"},"modified":"2011-05-03T11:09:39","modified_gmt":"2011-05-03T15:09:39","slug":"new-mac-trojan-horse-and-security-tips-from-the-nsa","status":"publish","type":"post","link":"https:\/\/mikemartinezonline.com\/blog\/2011\/05\/03\/new-mac-trojan-horse-and-security-tips-from-the-nsa\/","title":{"rendered":"New Mac Trojan horse and Security tips from the NSA"},"content":{"rendered":"<p>There is a new Mac Trojan horse masquerades as virus scanner \u2013 read about that <a href=\"http:\/\/goo.gl\/1Ymyx\"><strong>here<\/strong><\/a> . This is another example of social engineering &#8211; tricking users into making security mistakes.    <br \/>Users looking for legitimate protection against viruses on their Macs might be duped into downloading and installing this. Essentially this is \u2018<a href=\"http:\/\/goo.gl\/lUZoG\">ransomware<\/a>\u2019. It requires payment to \u2018stop\u2019 the \u2018infection\u2019. AND the payment information is often then sold to other nefarious people.<\/p>\n<p>Remember that NO operating system is immune to attack. And since every system is utilized by humans they remain the biggest weak link &#8211; humans that is.<\/p>\n<p>Also in other security news the NSA has released some good advice and documents for better security practices with your home network, and Operating Systems (including Mac OSX).   <br \/><a href=\"http:\/\/goo.gl\/HVcZD\"><strong>Read about that here<\/strong><\/a><strong>.<\/strong> [<em><font size=\"1\">via PCMAG Security watch blog<\/font><\/em>]. <\/p>\n<p>Nearly all of this contains information that I and other security people have been saying for years but is well worth reading.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a new Mac Trojan horse masquerades as virus scanner \u2013 read about that here . This is another example of social engineering &#8211; tricking users into making security mistakes. Users looking for legitimate protection against viruses on their Macs might be duped into downloading and installing this. Essentially this is \u2018ransomware\u2019. It requires &hellip; <a href=\"https:\/\/mikemartinezonline.com\/blog\/2011\/05\/03\/new-mac-trojan-horse-and-security-tips-from-the-nsa\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;New Mac Trojan horse and Security tips from the NSA&#8221;<\/span><\/a><\/p>\n","protected":false},"author":587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,52,7,21,13,151,61],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/406"}],"collection":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/comments?post=406"}],"version-history":[{"count":0,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/406\/revisions"}],"wp:attachment":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/media?parent=406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/categories?post=406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/tags?post=406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}