{"id":4772,"date":"2011-09-28T16:27:00","date_gmt":"2011-09-28T16:27:00","guid":{"rendered":"https:\/\/evssolutions.com\/new-apple-os-x-malware-fraud-prevention-tips\/"},"modified":"2011-09-28T16:27:00","modified_gmt":"2011-09-28T16:27:00","slug":"new-apple-os-x-malware-fraud-prevention-tips","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/new-apple-os-x-malware-fraud-prevention-tips\/","title":{"rendered":"New Apple OS X Malware: Fraud Prevention Tips"},"content":{"rendered":"

A new attack against Apple Mac OS X Lion was detected
\nearlier this week. The fraudulent threat is a Trojan, and is installed through
\na fake Adobe Flash installer downloaded from a third party site.<\/p>\n

The Trojan is called the Flashback, and uses social
\nengineering to prompt the user to download and install the malware. The user
\nmust complete the installation process for the malware to function. The
\ninstallation process looks just like what a standard Adobe update looks like,
\nonly the update didnt come from the Adobe web site.<\/p>\n

We always say your strongest fraud prevention tool is
\nyourself. Never download an Adobe Flash update unless you are on Adobe.com as a
\nURL address verification step.<\/p>\n

Other tips:<\/p>\n

Stay
\nalert dont install an update unless youre familiar with it<\/p>\n

Run
\nantivirus and internet security software on a regular basis<\/p>\n

Act
\non any notifications that come up during your security scans<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

A new attack against Apple Mac OS X Lion was detected
\nearlier this week. The fraudulent threat is a Trojan, and is installed through
\na fake Adobe Flash installer downloaded from a third party site.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4772"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4772"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4772\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}