Posts Tagged ‘phishing’

How to Avoid and Remove the MacDefender Malware

Friday, May 27th, 2011

Recently the MacDefender Malware has created a lot of concerns for Mac users all around the world. Quickly spreading, the MacDefender Malware is a phishing scheme that presents  a message that informs users that their system has been corrupted. The ploy goes on to tell Mac user that the only way to remove the viruses is to utilize the MacDefender app. The MacDefender malware can also appear as MacProtector and MacSecurity. The malware does not infect a user’s machines with viruses or monitor keystrokes. Their sole purpose is to frighten and persuade users to purchase the MacDefender application thus gaining access to the customer’s credit card information.

apple logo

from http://www.Apple.com, May 2011

Mac has estimated that between 60,000 and 125,000 Mac users have already been exposed to this malware. Most users have encountered this problem through poisoned Google images. When users access a poisoned link, a page will launch and display a virus scan. After being transferred to the infected webpage the software begins to download and informs users of an infection. Previously the malware required permission to install but despite the efforts made by Mac a newer version of the malware has been created, which no longer needs the user’s permission. This MacDefender version automatically installs on a machine during the fake scan process.

Mac has yet to take action against the initial malware but has stated they will have a resolution with their next OS X Update. Mac states that they will “deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants. Mac however has not addressed the new version of the malware and has also informed their support staff Not to assist users with MacDefender removal. Although the support staff has been instructed not to assist with its removal, Mac has provided the following on how to prevent the malware from installing and how to remove once installed.

Avoiding Installation:

  • If users experience any notification concerning the mentioned security software, immediately exit the browser.
  • If the browser fails to quit, perform a Forced Quit. To perform a force quit go to the Apple menu and choose force quit. Alternatively you can Force Quit by pressing Command+Option+Esc, and then choose unresponsive program followed by clicking force quit.

Removing the Application:

  • In the event that the malware was automatically downloaded and launched, do not enter your administrator password.
  • Do not provide your credit card information.
  • Access your download folder and delete the application.
  • Once the application is deleted make sure that you also permanently delete is in your trash folder.
  • Close the Scan Window.
  • Go to the Utilities folder in the Applications folder and launch Activity Monitor.
  • Choose All Processes from the popup menu in the upper right corner of the window.
  • Under the Process Name column, look for the name of the app and click to select it.
  • Click the Quit Process button in the upper left corner of the window and select Quit.
  • Quit the Activity Monitor application.
  • Open the Applications folder, locate the app again, drag it to the trash, and permanently empty the Trash

In addition to the MacDefender app a login item is also placed in the user’s system preferences which can be removed by opening system preferences, selecting accounts, clicking login items, selecting remove and then clicking the minus button. Although it is not necessary it is advised that users to remove this login item.

Check back later as more details develop to learn more about the MacDefender malware and possible solutions.

Thanks for Reading and Have a Great Day!

Dustin

ComputerFitness.com

Providing Tech Support for Businesses in Maryland

Cyber Criminals, Targeting Your Sympathy in the event of a tragedy!

Friday, March 18th, 2011

When natural disasters occur many people and groups across the world feel sympathetic to those that have to endure through the hard times.   Whether it is through donations, prayer, or assisting in reconstruction, people usually come together and offer their support in one form or another.   However, this of course is not always the case and where good hearted people may see an opportunity to help out there are others out there that are looking to take advantage of the situation.

phishingAlthough the Internet has greatly advanced over the past years it still remains vulnerable to cyber criminals.   Even with the number of safety and security precautions established on the Internet the number of threats has nearly doubled within the last two years.   Social media may be partly responsible for the growing number of threats because as the number of web users increases so does the number of these attacks.

Taking into consideration how much the Internet has evolved and the number of security features that have been implemented one thing remains the same and that is the human factor.   Not all people are good and this is evident with cyber hackers, criminals, and the other individuals that only see the negative opportunity when tragedy occurs.

There are a number of ways cyber criminals take advantage of the Internet and web users. Among the most frequently used methods is phishing.  These websites and emails are designed not so much to take advantage of the people impacted by a tragedy but the sympathy and compassion others express following the disaster. These sites and emails are created to make them appear as a legitimate company, meanwhile they have no connection to that company whatsoever nor do they have any intention of offering the support they are promising.   Their only purpose is to gain access to your information and money.   Following the devastation in Japan or any of the other natural disasters like the Indian Ocean Tsunami and Hurricane Katrina , most the time people want to help which makes them a perfect target for online scammers.

Often times it is amazing how quickly support efforts are rallied. It is shocking but not surprising that just as fast as support efforts are gathered the same is being done for fraudulent swindles. As if the catastrophe wasn’t bad enough now the people who are trying to do something to help and make a difference now have the misfortune of being mislead and cheated as well.   Not only are these individuals cheated out of money but the group of people facing the tragedy is not receiving the help and support they were meant to have.

Already a number of fraudulent relief efforts have been reported and there are probably many more that are yet to be discovered.   Its important to remember that there always has been and most likely always will be someone trying to profit from the kindness of someone else and not to fall victim to their attempts.   Remember that these criminals seek out these opportunities and take every advantage to exploit them.   Some key tips include not providing your information through email and making sure that you are doing your research before donating.   If you wish to help make sure you locate a secure, legitimate and reputable organization for which to offer your support with.

Learn more by going to the links below

Current situation in Japan

CBS News, Disaster in Japan

Have a Great Day!

Dustin

ComputerFitness.com

Providing Tech Support for Businesses in Maryland