{"id":754,"date":"2012-04-25T01:27:07","date_gmt":"2012-04-25T05:27:07","guid":{"rendered":"http:\/\/mikemartinezonline.com\/blog\/?p=754"},"modified":"2013-04-14T01:23:14","modified_gmt":"2013-04-14T05:23:14","slug":"another-flashback-variant-2nd-in-two-days","status":"publish","type":"post","link":"https:\/\/mikemartinezonline.com\/blog\/2012\/04\/25\/another-flashback-variant-2nd-in-two-days\/","title":{"rendered":"Another Flashback Variant &#8211; 2nd in two days!"},"content":{"rendered":"<p>Hey Mac users who still haven&#8217;t taken the hint and update your systems&#8217; security there&#8217;s yet another version of the Flashback Trojan for you to enjoy.<\/p>\n<p>It infects unprotected Macs in the same way Flashback.K did, through a Java applet exploit, and installs itself without the need of your password.<br \/>\nAnd, just as its predecessor, Flashback.K erases its footprints by deleting the Java cache and ensures its propagation by installing into the Java Update folder. <a href=\"http:\/\/bit.ly\/IAUGcA\"><strong>You can read more here<\/strong><\/a><strong>.<\/strong><\/p>\n<p>Apple released a Java patch in early April, as well as a Flashback removal tool, but clearly not all Mac users patched.<\/p>\n<p><strong>But many Mac users don&#8217;t even qualify for the patch\u2014it was only available to systems running OS X 10.6 (from 2009) and later. Mac users running OS X v.10.5 and earlier were advised to disable Java altogether. WTF!! However, it&#8217;s quite possible that many users of these older systems just didn&#8217;t get the memo and are still running insecure software.<\/strong><\/p>\n<p><a href=\"http:\/\/bit.ly\/I36UuH\">Here<\/a> is F-Secure\u2019s site that has the checker and removal tool. Check that out too. And please update your systems folks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hey Mac users who still haven&#8217;t taken the hint and update your systems&#8217; security there&#8217;s yet another version of the Flashback Trojan for you to enjoy. It infects unprotected Macs in the same way Flashback.K did, through a Java applet exploit, and installs itself without the need of your password. And, just as its predecessor, &hellip; <a href=\"https:\/\/mikemartinezonline.com\/blog\/2012\/04\/25\/another-flashback-variant-2nd-in-two-days\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Another Flashback Variant &#8211; 2nd in two days!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[149,10,7,21,13,151,61],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/754"}],"collection":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/comments?post=754"}],"version-history":[{"count":3,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/754\/revisions"}],"predecessor-version":[{"id":948,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/754\/revisions\/948"}],"wp:attachment":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/media?parent=754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/categories?post=754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/tags?post=754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}