Tag: Apple iMac

More malware being discovered for the Macintosh platform

Article

Apple MacBook Pro running MacOS X Mavericks - press picture courtesy of Apple

Even Apple Macintosh users need to keep secure computing habits

Mac Malware Opens OS X Backdoor to Attackers | Tom’s Guide

My Comments

A lot of Apple Macintosh users have jumped to this platform based on an initial fact that there was very little malware written for it. But now, as more people are using Macs, they are becoming a target for malware including some “backdoor” software which weakens the MacOS’s defences against other malware.

This time, what was being called out was a Trojan-horse program that pretends to be a file-conversion program, the kind of program that is easily downloaded in a hurry.

Keep your Mac’s operating system and software patched and updated

A good practice regarding keeping your Mac secure, as with other computing platforms, is to make sure that the MacOS operating system is up-to-date with all the patches that Apple releases. This is because Apple may have released bug-fixes or remedied exploits that have been discovered in your version of the MacOS operating system.

Preferably, I would recommend you have this set up to work automatically so that when you are connected to the Internet via Wi-Fi or Ethernet, your Mac is kept updated and patched.

You can set this up to be performed automatically by going to [Apple] – [System Preferences]. Then you go to the App Store panel if you have one of the newer versions of MacOS (Yosemite onwards) then check the boxes for “Automatically check for updates” and “Download newly available updates in the background”. This will then make the “Install OS X Updates” option available which you should check.

For Macs that run prior versions, you would still go via [Apple]-[Software Update] and set the appropriate options to automatically patch your version of MacOS X.

You can manually update and patch your Mac by visiting the App Store if you are in Yosemite or newer versions and tick off all of the software that needs updating in the Updates panel. For prior operating systems, you would need to visit the [Apple]-[Software Update] menu and click the option to download and install the latest patches for your Mac.

You can still visit the Updates panel in the App Store and go through all the apps that need updating so you can be sure they are up-to-date. If you have software that isn’t delivered via the App Store, use its interface or the software developer’s Website to keep it up-to-date. This is also important because older versions of application and other software can carry bugs or exploits.

This is something you should do when you switch your Mac on if you haven’t used your Mac or haven’t connected it to the Internet for a significant amount of time, such as with a secondary-use MacBook or a Mac that you use as part of multi-platform computing.

Upgrade your Mac’s operating system if you can

It may be worth upgrading your Mac’s operating system to a newer version if your computer can handle it. In most cases, you can update the system for either pennies’ worth or for free. Here, you could check the App Store or Apple’s website regarding newer operating systems for your Mac.

The main advantages that these new operating systems offer encompass system-wide hardening including the availability of the Mac App Store where the software is verified before it is made available.

Make sure you download software from reputable sources

For all computing platforms, one requirement for safe and secure computing is to obtain computer software from known reputable sources.

In the case of the Macintosh, either download new software from the Mac App Store where the software is verified or from the website of a trusted and known developer. Even when you obtain software from the Mac App Store, check the quality of the software by looking through the reviews that are posted about it and checking the reviews also for other software offered by the same developer. I have written an article about obtaining software from app stores because there has been a risk of them turning in to the equivalent of bulletin boards and download sites that host poor-quality software.

When it comes to software delivered in a packaged form, avoid the temptation to install from anything unless you have bought it yourself from a reputable dealer.

Consider desktop-security software for the Mac

This may sound foreign to Apple Macintosh users but you may also find that it may be worth considering the installation of a desktop-security / endpoint-security program on your Mac. It is more so if you or others who use your Mac are not astute when it comes to downloading software or handling the Internet.

Most of the developers who have written these kind of programs for the Windows-based computers have now written versions of these programs for the Macintosh platform because of the rise of threats against this platform. Like with Windows, the better desktop-security programs also offer protection against Internet-borne threats such as site-reputation checking, content filtering, and spam filtering. Similarly, better-quality software runs in a manner that doesn’t impinge on your Mac’s performance.

Conclusion

Like other computer platforms like DOS / Windows, the Apple Macintosh needs its users to be careful about keeping their computer and data secure. This includes keeping the operating system up-to-date along with being sure about what software you have on your computer.

Macintosh users–keeping your computer secure

Article

Apple users: Try these five tips for better Mac security | Naked Security

My Comments

Just lately, I have heard over the dinner table that a few Apple Macintosh computer users have been facing issues with malware and other software with questionable behaviour. Some of these attacks were mainly “overlay attacks” that worked with the user’s Web experience.

What previously used to happen was that Windows computers were the target for viruses, worms, Trojans and similar malware due to them having a stronger installed base compared to the Apple Macintosh platform. This caused some people to switch to the Apple Macintosh platform because of less malware threats occurring on that platform.

But even in 1989 when I was made aware of the virus issue, the awareness about viruses and similar malware was targeted across all personal-computing platforms that were in operation through that year i.e. the MS-DOS-based IBM PC, the Macintosh, the Commodore Amiga and the Apple II amongst others. At that time, there was awareness about keeping a “clean” system and keeping control over how you shared your files.

Similarly, we started to see the arrival of signature-driven anti-virus programs that could scan hard disks or removable “floppy disks” for viruses. Some of these initially scanned the boot sector but moved towards checking files for these viruses. They became a very important part of every computer user’s software toolkit as the virus activity increased. But through the 1990s as the Internet came on the scene, the malware activity was more focused on the MS-DOS / Windows platform with Apple Macintosh users not having as much of that activity. At that time, the MS-DOS / Windows platform was effectively the computing platform for most personal and business computing applications including gaming with the Macintosh being used by creative types due to its inherent prowess with multimedia.

This lead to a sense of complacency concerning secure computing for the Macintosh platform on both Apple’s and their users’ part. Microsoft took proper steps in updating and patching the Windows computing platform since 2001 with the arrival of Windows XP and hardening that platform with the arrival of Windows Vista and 7. Similarly, Windows users jumped over to the Macintosh platform for their home computing because they saw Windows as being slow and virus-ridden; and also due to the arrival of Apple’s iPod and iPhone products.

Lately, the Apple Macintosh has become the target for various malware campaigns including “write-once run-anyone” attacks based on Adobe Flash and Java software platforms. This is due to the increased new-found popularity that the Macintosh has acquired and, in another context, activities involving the Internet, networks or removeable media are still being seen as vectors where the Mac can share Windows-targeted malware.

Upgrade to Mavericks if you can

To stay secure, Apple Macintosh users need to upgrade to the 10.9.2 Mavericks version of MacOS X, with this version being equipped with various security improvements in a similar way to what Microsoft did with Windows 7. This can be done with newer Macintosh computers and for free with Macs running Lion or Mountain Lion versions.

Keep the operating system and software up-to-date

As well, as part of proper computer housekeeping, it is important to keep the Mac “lock-step” with the latest operating-system updates. Here, you can use the Apple-Menu / System Preferences / App Store option to have the Mac check for and download the updates from Apple by itself; or go to the Apple-Menu / Software Update menu to cause it to check for updates. The latter option can be of use with a MacBook that is used “on-the-road” and you are able to check in at a Wi-Fi hotspot or other Wi-Fi network.

Similarly, keep Adobe Flash and Oracle Java up-to-date by using options in the Apple-Menu / System Preferences menu to check for automatic or manual updating for these programs. If any other “write-once run-anywhere” software-development platforms show up on the Macintosh platform, treat these like you would with Adobe Flash – they can become a path for distributing malware that “hits across all platforms”.

This also applies to the application software and utilities you also run on your Mac and, here, you go to whatever software-option menu there is to check for software updates or cause automatic software updating to occur.

Don’t enable Java if you don’t need it.

As for Java which appeals as a “write once run anywhere” coding system, don’t enable it unless you are intending to run a known trusted program that uses this language or are developing Java software. OS X Mavericks comes with this deactivated by default but you can deactivate this in your Web-browser option menus.

Take advantage of full-disk encryption if you have confidential data

Another practice you could use for all computer platforms is to take advantage of full-disk encryption. Most operating systems provide this as a function that you can use with MacOS X providing it “across the board” for recent iterations in the form of FileVault. Similarly, a commercial or open-source third-party full-disk-encryption tool can do the job better than what the operating system provides.

These tools encrypt and decrypt on an “on-the-fly” basis and mainly protect the local volumes on the computer with some business-tier USB memory keys providing a similar full-disk encryption for their own volumes.

Use a good anti-malware or desktop security program for the Macintosh

Check for and use a good anti-malware program for the Mac platform like Kaspersky, Sophos, AVG or ClamXav . As well, keep the anti-malware program that you run on automatic update in order to keep them ahead of the malware game.

It is also worth noting that the good programs in this field can also keep the Macintosh from being a conduit for spreading Windows-based malware around the Windows platform. This is whether the files are passed through email, message-based file transfers, network-hosted / Internet-hosted file sharing points or removeable media.

Another sign of a good anti-malware program is the ability for it to scan your computer’s primary storage (RAM and paging files) to protect against malware that works on data being held in this space. This is because most data normially encrypted on a secondary storage or in transit is kept “in the clear” in the RAM and is vulnerable to RAM-scraping malware.

Keep stock of what is installed on your Mac

Another way malware gets on to computers is when you load software “in a hurry”. Typically what can happen with some freeware tools is that they can “push” browser extensions and toolbars or utilities of doubtful provenance on to a computer. This can lead to it underperforming or malware creeping in and taking over the system.

If you download from the Mac App Store or similar download locations, check for the app’s reputation by looking at comments, star-ratings and the like. This is something I have raised previously in relation to app stores for mobile-computing platforms along with the newer App stores that are opening up for regular computers and dedicated-purpose devices.

With your browsers and other applications, keep tabs on what plugins, extensions, toolbars and other add-on modules are running and if you notice something being awry about the module since you installed, don’t hesitate to remove it. A good article on this topic concerning uninstalling applications on the Mac is this one on MacRumors.com which highlights that dragging an application bundle to the Trash may not be the only method available.

Conclusion

The main issue here is that the Apple Macintosh is a computing platform vulnerable to malware and will become more so as it be becomes more popular as a mainstream computing platform. So you would need to continue with proper computer-housekeeping practices to keep your Mac from these threats.

Gift List–Mother’s Day

Sometimes you may be stuck for technological gifts to give Mum on her special day. Here, I have assembled a list of ideas to get you going, especially when it comes to high-value gifts where you can pool resources together to fund these gifts rather than buying many low-value gifts.

Tablets

Small size for the purse

Toshiba Thrive AT1S0 7" tablet

Toshiba AT1S0 7″ Android tablet

The small 7” tablet computers come in to their own if the main goal is to have it on hand in your coat pocket. They can also fit comfortably even it to mid-sized handbags to use as an electronic notebook or electronic reference book.

To keep in the handbag, at home or the office

Toshiba AT300 10" Android tabletA 10” tablet may come in to its own if the main goal is to read or view online content while relaxing in that armchair or in bed. Similarly, they could come in to their own with a larger handbag or shoulder bag.

No tablet computer is complete without a matching accessory cover or wrap that suits Mum’s taste. If she owns a tablet computer, you may offer her a newer cover or wrap, perhaps to replace that tired old one that she has on that tablet.

Computers

Small ultraportables

HP Envy X2 detachable-screen hybrid tablet-notebook computer

HP Envy X2 detachable-screen hybrid tablet-notebook computer

Small ultraportable computers that range from 11” to 14” can earn their keep for “on-the-go” computing tasks. This is more so if Mum wants to create a lot of content like typing up many email letters, writing memoirs or simply working a blog.

Larger laptops

Toshiba Satellite P870 desktop-replacement laptopOn the other hand, a standard-size laptop or “desktop tablet” computer may come in handy if the goal is a computer that is mainly used at home and the desire is to store it away neatly when not in use.

All-in-one

The “all-in-one” desktop computer, with the computing power, screen and storage in one slender box, can become an alternative computer option if you want an elegant desktop computer. They are also becoming increasingly capable rather than glorified “kitchen kiosks”.

Printers

HP Photosmart 7510 multifunction inkjet printer

HP Photosmart 7510 multifunction inkjet printer – predecessor to the Photosmart 7520

As for printers, it may be worth looking towards a durable network printer that is cost-effective to run. Be careful of the printers that are cheap to buy because these units will be expensive to run due to short-capacity inks and toners, with situations where the cost of replacing ink or toner is as much as buying a printer of the same standard.

HP Photosmart 6520 or Photosmart 7520 desktop printers

HP Envy 120 – a neat aesthetically-pleasing printer for low-demand applications such as being a secondary printer

Brother MFC-J825DW or DCP-J725DW / DCP-J925DW

Small music system

1-piece including speaker docks and wireless speakers

Marantz Audio Consolette speaker dock (Photo courtesy of Marantz / Gap Marketing)

Marantz Audio Consolette speaker dock

These single-piece systems, including speaker docks and wireless speaker systems, typically have a small footprint and can fit well on the kitchen bench or on the sideboard. Some of these may offer a “full” sound that encompasses te bass notes and the treble notes properly.

3-piece

Sony CMT-MX750Ni Internet-enabled micro music system

Sony CMT-MX750Ni – an example of a DLNA-compliant music system for a hotel room or serviced apartment

A three-piece system with separate speakers has increased flexibility. Here, you can keep the main unit on the sideboard and position the speakers further away, including mounting them on the wall or having them flank a fireplace or feature window.

Earphones and headphones

Creative Labs MA930 in-ear mobile-phone headset

Creative Labs MA930 in-ear headset

I would suggest that you look towards a few sets of headphones that suit different activities. For example, a pair of lightweight supra-aural headphones can work well for jogging or walking with good examples being provided by B&O (Form 2review), Bose, Denon, Sennheiser and Sony.

Earphones can also work well for public transport and other noisy environments especially where discreet use is required. Similarly a pair of good circum-aural headphones can go a long way for detailed music listening at home or in noisy environments.

It is worth having a look at this buying guide to be sure that the headphones fit yours and Mum’s desires.

Gaining the most out of the Internet experience

Internet setup

If there isn’t a broadband Internet service at Mum’s home, it could be a good gift idea to set up one there and install a good-quality router for the network as in the article that I had done about the “family house”.

To the same extent, optimising the home network with at least 802.11n dual stream coverage everywhere, preferably simultaneous dual-band 802.11n dual-stream Wi-Fi. As well, I would make sure that there is a HomePlug AV powerline segment in that network even if there is Ethernet in the house. This is to cater for ad-hoc wired-network setups.

The reason I would think of this is that you may be dealing with increased use of multimedia from online sources at the TV, laptop or mobile devices and you want reliable operation from these services.

Education

Similarly, you may pool resources together to give Mum access to IT education and support programs/ This is more so if she hasn’t got much in the way of computer skills.

Online content

As well, pooling resources to an online content service such as Spotify, Netflix, Hulu or QuickFlix may be a way to give her access to the music and movies that these services provide. In the case of Spotify, this may be about using it as an online music library or as a “music tryout” service that can be part of her complete music experience.

These services are not about replacing the existing content library but about hunting for new content that may be of interest.

Conclusion

I wish you all a very happy and prosperous Mother’s Day with lots of fun, with you using this as a way to choose the right gift that will be value for money.

Windows 7 hardware intended to upstage the Apple Mac hardware

News articles and links to campaigns

HP Envy premium laptops – HP US site

Acer Aspire Z5610 spotted in the wild – Engadget

Windows 7 launch day hardware spectacular – Engadget

L’Acer Aspire Z5610 également multi-touch – Journal Du Geek (France – French language)

My comments

Last night, I was checking on my blog and had noticed that Hewlett-Packard had taken a vertical image ad on one of the AdSense ad units that I have running on the blog just close to when Windows 7 was launched. This ad had an image of the Envy laptop and the words “The Power Of Envy” written down the ad as well as the HP and “Intel Inside” logos. So I did a search using Bing on the terms used in the ad and this led me to HP’s series of Windows-7-based Envy premium laptops, rather than clicking on the AdSense unit so I don’t commit click fraud. Judging from the photos of the HP Envy laptops that I saw on the campaign site, the look of this computer reminded me of a recent-model Apple MacBook Pro laptop.

Similarly, there was an Engadget post about the Acer Aspire Z5610 all-in-one PC which had the look and functionality that could upstage the newer Apple iMacs. As well, the “all-in-one” computers listed in Engadget’s Windows 7 launch day hardware list were styled to look like a tabletop version of a European-built premium flat-panel TV. Similarly, Sony had just launched a VAIO all-in-one computer that mimics the industrial design of one of the small-screen BRAVIA flat-panel TVs

These hardware product launches were intended to be hot on the heels of Apple’s recent iMac and MacBook prduct-range launch and most of these machines would appeal to Windows buyers who like the look of Apple’s computer range.

In my honest opinion, the Windows 7 launch has heralded one of the biggest consumer-computing platform showdowns ever.