Just when you thought it was safe to go back into the water….or at least to sail upon it. In all seriousness, these types of warnings and attacks are indicative of the lengths to which cybercriminals will go to steal, pillage and attack. Be cautious and take the time to evaluate cybersecurity controls at every level of your organization.
A little virtual exercise for anyone reading this article this morning – raise your hand if, when you close your eyes and go to your happy place, you truly believe Apple Mac computers cannot get viruses or malware. Go ahead. Be honest. Search your heart for what is often a painful truth. I saw a few hesitant hands go up, at least for a second or two. It is ok. I get it.
I am a Mac user too, and though I would love to believe my Mac is safe and sound from all malware attacks and virus strains, the truth is Macs are targets too and viruses and malicious code is being developed and deployed everyday to infiltrate our Apple devices, collect data, and cause harm. Yes, Macs represent a smaller target pool in comparison to Windows workstations, but Macs are still a target. In many cases, Macs are specifically targeted because of the types of power users and executives who choose to use Apple products.
As this article from Eset demonstrates, the threats are real and precautions are warranted. Make sure you properly patch and configure your Mac workstations and laptops. Run a form of advanced malware protection. Be prepared.
This article is a wonderful reminder of the potential pitfalls inherent to human nature. Everyone loves a free gift. Everyone loves a gadget. USB is the devil. I believe that just about sums it up!
Details surrounding this cyberattack are scarce and the severity is largely unknown, though initial information points to a large, very serious attack. More details to come as they become available. Be cautious and spread the word!
This is yet another example of effective Android malware. Please take the time to vet your app sources. Think twice about 3rd party sources. Verify!
This is very sound advice. Think about bookmarking this list or printing it off and having it handy in the event of malware or a social media intrusion.
The threat is becoming more and more relevant each and every day. Basic precautions with your mobile device are no longer sufficient. There is a real need for mature mobile device anti-malware protections. Also, mobile device management can provide a limited mitigating control.
Mobile platforms are a growing target for cyber criminals in terms of value, especially for platforms like Android that exist in a more open ecosystem. The time is quickly coming for better controls and mitigation strategies.
This is yet another version of ransomware-inspired malware that is finding weaknesses and ways around traditional endpoint defenses. Beware.
As mobile devices continue to dominate our choice for Internet access, a significant increase in smartphone and tablet malware is inevitable. Along with this will come hijackings and botnet farming.