Categories
Entradas Mac Os X

Security Programs and Tools for MacOS

Antivirus for MacOS

When we talk about viruses, many believe that it is exclusively Windows. We already saw that there were very interesting antivirus and security programs for Linux. The same is true on macOS. There are viruses for this platform, although they are not as common as in the case of Microsoft. This is due to market share.

Avast

One of the most popular antivirus And also easy to use is Avast. It is cross-platform and one in which it is present is for MacOS. It has a free and paid version. It depends on whether we want it very complete or just the basics, one or the other will suffice.

It has a very intuitive and easy interface of using. Without a doubt it is one of the best antivirus that we can have in our system. It is convenient, yes, to have it updated. Only then can we deal with potential new threats that attackers have perfected.

Sophos

Another of the antivirus that we have for MacOs, and also a classic, it’s Sophos. It offers users to scan all files for threats, as well as the ability to scan USB drives, for example.

It allows us to delete or quarantine files. It is very useful, does not require much space and it is simple to use. In addition, it hardly consumes resources from our computer, so it is ideal for those who do not have a very powerful computer.

Avira

Avira is another antivirus we have for MacOS. It is a free program. Is easy to use, fast and has many options. It allows us to detect suspicious files that we are going to download from the Internet.

The difference compared to the previous one is that this antivirus requires more resources and it takes up considerably more space. Still, it is an interesting option.

Malwarebytes

But not everything is antivirus. Therefore, a very interesting application that we must have on MacOS is Malwarebytes. Although it has protection against viruses (not in real time), it also allows us to eliminate adware and other malware from our computer. It is ideal to have a clean system and take advantage of resources.

Carbon Copy Cloner

One of the types of threats that are increasing the most in recent times are ransomware. This type of malware, as we know, encrypts all files and folders on your computer. In return, the attackers ask for a financial ransom to decipher them.

To avoid these problems a good solution is to create backup copies. Only in this way will we ensure that we do not lose data in the event of a hypothetical attack. One of the applications for MacOS that takes care of this is Carbon Copy Cloner. It is a very complete tool to clone all our disks and keep the files safe.

Categories
Entradas Mac Os X

Unzipping files directly with Safari allows malware to enter

Unzipping files automatically in Safari, a risk

It’s about a exploit for Safari, the default browser for this operating system. Cybercriminals could run malware through files that require decompression.

A group of security researchers has demonstrated how Mac systems can be remotely infected with malicious software. It involves using Safari to visit a malicious website and download an infected file there, leaving the door open for cybercriminals who install malware on your computer.

It’s about a zip file containing the malicious application. In case the user uses Safari as a browser, that file will be unzipped automatically. This is because the system considers it safe.

Once the user has unzipped the file, the application will be on the system. This will trigger the registration of any URL controller. That same malicious site could run code that will cause macOS to launch the malicious application. A pop-up window will appear asking whether or not we accept this process.

This pop-up window it could be normal for the user. However, it is a window controlled by the cybercriminal. If the user clicks allow, it would leave the computer open to the entry of any malware or be controlled remotely.

Apple has built-in fenders to MacOS to protect against attacks like this. However, these defenses cannot help in the case of this attack carried out via Zip files in Safari. Apple would have to change the way the browser handles documents and URLs. They might revoke a malicious app’s certificate, but it’s too late once it’s installed.

How to protect yourself from this problem that affects MacOS

However, there is a simple way to protect ourselves. To do this, you must modify the option “Open safe files after download”. You have to enter Preferences and uncheck this option. By doing this, Safari will automatically stop opening files it thinks are safe. In this way, files that could put the system at risk will not be automatically decompressed.

Furthermore, cybercriminals in this case assume that the user is using Safari. Another solution goes through choose another browser that does not automatically open files. In case of using the default browser on MacOS, it is recommended to do what we have mentioned above. In this way we will prevent possible malicious files from being automatically executed when downloaded.

Safety is a fundamental aspect to keep our equipment in good condition. That is why it is convenient to have security programs and tools. Many files can contain malware.

Categories
Entradas Mac Os X

Hands Off !, a firewall for Mac OS X operating systems

The biggest problem that users face today is sending private data by applications. To do this, they must establish connections to remote servers and this application allows you to view all the established connections, indicating the port and the remote IP address, thus allowing to prevent this information leakage of which in many cases the user is not aware.

The above functionality, in addition to preventing information leakage, makes it easier for the user to control which applications have Internet access and thus block or allow Internet access.

The user will also have the option to choose which applications can be run and access the data on the hard disk, preventing applications from malware are carried out in an unauthorized manner and may carry out unauthorized actions.

Obviously, it is not an antivirus tool as such, but can be considered a system monitor equipped with a firewall that allows monitoring and controlling network connections.

Derived from one of the functions that we have already talked about, the user will be able to create white lists and black lists of applications, assigning different permissions to those that are within the first one depending on the user’s needs.

In addition, every time an application is launched or attempts to access the Internet, a pop-up message will be shown to the user on the desktop where they can select the access level.

Hands Off! is available for 20 euros

We have already mentioned before that it is not a free tool, however, it must be said that the price is quite affordable and if we want to have an advanced network and resource monitor the price will be 20 euros. All those who are interested in its acquisition should know that the application has a demo that can be tested from this link, and thus observe if it actually meets expectations or not.

We recommend you read our tutorial on how to enable and configure the router firewall to prevent intrusions in home and professional local network.

Categories
Entradas Mac Os X

An Apple ID on the Dark Web costs about 15 euros

Less than € 15 is the value of an Apple ID

According to an investigation, these Apple IDs are the non-financial accounts that are paying the best on the Dark Web.

The company Top10VPN, which offers VPN services, has revealed that Apple IDs cost on average $ 15.39 each. This equates to almost 15 euros. They also indicate what we have mentioned above, which is the highest price a buyer pays on the Dark Web for an account that is not related in any way to financial services.

PayPal, the most expensive

If we look at the most expensive credentials, also joining the financial ones, it would be PayPal in the lead. Specifically, you pay $ 274 on average for an account. A figure that, as we see, is much higher than for an Apple ID account.

Others related to finance, such as Western Union, are bought for $ 101. A debit card is around $ 67.

They also add that a Microsoft account to connect to Skype they sell for about $ 10. Cybercriminals use these accounts to spread malware, link to fraudulent sites, or boost phishing.

As we know, phishing is one of the most frequent threats through emails. What the attackers want with this is to get the victims’ credentials. Try to subtract the username and password. It is very common in bank accounts.

Avoid phishing, key

There is ways to avoid phishing. The main thing is to use common sense. A bank, for example, will never ask for your credentials via email. We must also avoid putting our data on a page that we are not sure if it is the official one. We must avoid falling into possible baits, social engineering, that cybercriminals use for their benefits.

In short, an Apple ID is sold on the Dark Web for just under 15 euros. It is, if we except financial credentials, the most expensive account. It has great value, therefore.

It is always convenient protect our devices. Maintaining security and privacy is vital to proper operation. The ideal is to have security programs and tools that help us deal with possible threats. This is important for computers, but also for mobile devices.

We have seen the case of Apple and the IDs that are sold on the Dark Web. But also on Android we have reported banking Trojans that increasingly affect users. In the end, cybercriminals attack those sectors that have the most users. And if we talk about mobile phones, iOS and Android are the most used operating systems.

You can see another article where we show Amibreached to see the data on the Dark Web.

Categories
Entradas Mac Os X

Problems with the Wi-Fi connection of your iPhone or Mac OS X? We have suffered

To give us a background, it must be said that some readers of the portal have contacted us to inform us of this aspect and if we knew of any solution.

It must be said that the problem is quite annoying and appears especially when using the routers offered by the operators to access the Internet. With this we do not mean that these are the culprits, and below we indicate the reason.

It all starts with disconnections from the Wi-Fi network of our Mac OS X or iOS device, leading to situations in which the device is unable to connect to the network even though the access data is correct. But between these two extremes, there is an intermediate problem, which is none other than slow navigation, something that is reflected in the speed tests, obtaining latencies that exceed 200 ms and download and upload speeds that do not exceed 2 and 0.15 Mbps respectively.

At this point it would be very easy to blame the operator’s router, but what happens if we do a speed test with an Android device connected to the same Wi-Fi network at the same time? The result is surprising and disconcerting to say the least, obtaining the contracted speed and the usual ping of the line. So where is the problem? Is restoring the iOS device or Mac OS X the solution? In the first place we are not able to determine the place of the problem and we guarantee that resetting the device to factory values ​​will not solve the problem either.

From our point of view there must be some type of incompatibility between some access points and the wireless adapters of the devices of this manufacturer that should cause this type of behavior periodically, but as we have already mentioned, it is not something confirmed.

This is confirmed when we connect the Mac that has problems with the Wi-Fi network using the network cable and we obtain normal values ​​in the speed tests carried out.

Possible solution to these problems with the Wi-Fi connection of our Mac or iPhone?

We warn that this is a solution that has worked for us and that it is likely that other users who suffer the same problem will also work, but at no time do we guarantee that it will work in all cases.

Taking into account that the problem is located between the wireless adapter of the devices of the bitten apple (or the software that manages it) and the router, we are going to introduce an intermediate point between both. In other words, we are going to do without the router’s Wi-Fi network and use a PLC with its own access point and make use of it. After connecting the Mac and the iPhone and making normal use we see that the problem does not appear and that the web browsing is good.

Seeing that the result is good with the PLC, we tried connecting a neutral router to which it offers us Internet access and using its Wi-Fi network. After waiting a reasonable time we see that the operation is also correct.

Therefore, if you have problems with your Apple device and you feel identified with the above, you can try to use the Wi-Fi network of another computer and see if this solves the problem, as we have done.

We recommend you visit the tutorial on how to solve problems with the Internet connection: is it me or the operator?

Categories
Entradas Mac Os X

They could find out your iPhone password in 11 hours: so you can avoid it

The key to an iPhone in just 11 hours

When we were talking about GrayKey, we said that the police could access an iPhone with a 4-digit key in about 4 hours. If that phone had a 6-digit passcode, the time could take up to 3 days or more. However, this now it is considerably reduced and it could be accomplished in just 11 hours.

As we know, Apple has introduced security improvements over the years. They take something that many users ask for more and more seriously: security and privacy. In addition to disk encryption and other measures, one of the most interesting is the obligation to have a 6-digit mandatory access code. This, as we have seen, makes it much more complex to access than if it were only 4 digits.

But this may not be enough compared to the latest methods to access an iPhone, such as GrayKey. Now, as we have mentioned, it is possible to break a 6-digit password in just 11 hours. A time that is not excessive at all.

Now, can we make it much more difficult, almost impossible, to access our iPhone? The answer is yes. We explain how we can do it in a simple way and it is also highly recommended.

Mathew Green, a professor at the Information Security Institute, has made numbers to demonstrate the strength of iPhone passcodes, based on the number of digits. He has made estimates and has shown that if we have a 4-digit code, in the worst scenario it would take 13 minutes to break it, while the average would be just over 6 minutes.

More digits, more time

If we are talking about a 6-digit code, as is the subject of this article, in the worst case it would take a little more than 22 hours to access it. The average, as we have said, is just 11 hours.

But this changes a lot if we decide to put an 8 or 10 digit password on our iPhone. In the first case, it could take at most 92 days, while the average would be 46. In the second case, it could take up to 9259 days and the average is 4629 days … or what is the same, more than 12 years. Much better, right?

As we have mentioned, 4-digit passwords are no longer covered. However, if we really want to protect our iPhone, it is clear that it is best to have a 10-digit password. If someone wants to access it, they would have to wait, on average, more than 12 years. Surely give up before achieving it. Much better than the average 11 hours it would take with a 6-digit password.

Now, keep in mind that the GrayKey tool is limited, at least for the moment, to the police. No common iPhone thief is going to have this possibility.

Still, security experts suggest that those with an iPhone use a alphanumeric password of at least 7 digits. In addition, they should ideally contain letters (uppercase and lowercase) and numbers, as well as some special character.

How to put an alphanumeric key on iPhone

Putting an alphanumeric key on an iPhone is easy. We simply have to go to Settings -> Touch ID and password -> Change password. Later we go to access code options and choose Custom alphanumeric code.

As we have said, the ideal is that the key is complex, containing letters, numbers and other symbols. We must always avoid things like our name, surname, date of birth … Any information that relates us.

Categories
Entradas Mac Os X

macOS Sierra fixes a total of 60 vulnerabilities

macOS, formerly known as Mac OS X, is the operating system developed by Apple for its own computers. Although years ago this operating system was characterized by being a safe and virus-proof system, in recent years this has changed, seeing how hackers increasingly create more viruses for this operating system and how every little time vulnerabilities appear that the company it must solve, both with patches and with new versions, just as it happens with Windows.

Throughout yesterday, Apple released the new version of its desktop operating system, the new macOS Sierra. This new version has reached all users with several news and new features (nothing that has not been seen before in other operating systems) and, in addition, solving a total of 60 vulnerabilities both in the operating system and in its different applications.

Most of the vulnerabilities fixed with this new version of macOS allowed the erunning code remotely, allowing hackers to execute commands on Mac systems with which they can, for example, download other types of malware to infect the system.

The complete list of vulnerabilities solved both in the operating system itself and in the rest of its applications can be seen from the following link.

Besides macOS Sierra, other Apple apps also have critical security updates

The new macOS Sierra isn’t the only piece of Apple software that has received security updates. Specifically, for older versions of macOS, the new Safari 10 solves a total of 16 serious vulnerabilities that could also allow remote code execution. macOS Server 5.2 It has also received its dose of security patches to fix several detected vulnerabilities.

By last, iCloud for Windows 6.0 It has also been updated by solving several vulnerabilities that, this time, affected users connecting to the Apple cloud from Microsoft’s operating system.

Therefore, it is vitally important that macOS users install the new Sierra as soon as possible so that, in addition to taking advantage of the improvements and new features of this operating system, they can make safe use of the system. Additionally, users using Safari on Mac systems or iCloud on Windows should also update applications as soon as possible to prevent hackers from exploiting now known vulnerabilities.

Do you think Apple operating systems have lost their prestige as secure operating systems?

You may be interested in:

Categories
Entradas Mac Os X

Pirrit, a new adware designed for Mac OS X

That is, rummaging through the trunk of computer threats, we found one of the same type as the one at hand and designed for Windows operating systems, and everything seems to indicate that cybercriminals have reused the code and thus create a threat to the operating system of the computer. from Cupertino.

It is an open secret that cybercriminals are increasingly creating more threats to it, the market share of this manufacturer’s devices being a great fault for this, which is increasing, promoting this trend.

Amit serper, Cybereason’s security expert, has had the opportunity to test the threat in a controlled environment, stating that it is much more dangerous than its available version that was available several years ago for Windows operating systems and that it was limited solely and exclusively to introducing ads on the web pages in which the user navigated.

The positive part for users affected by this threat is that the security expert has made available to affected users a tool to eliminate the threat, which can be downloaded from the following link.

Pirrit is distributed as copies of MPlayerX, NicePlayer, and VLC

The best way to distribute threat is to make use of the image of other programs that are popular in operating systems. It happens in Windows and also in this one. Users who download a copy of one of the aforementioned software from the Internet and it is not the official one may be downloading the malwareHence, it is always advisable to use the corporate page.

As we have already indicated, the threat is more powerful than the solution that existed for Redmond’s operating systems, displaying not only advertisements, but also configuring a proxy on the user’s computer to redirect navigation to web pages of the threat owners and thus increase the monetization of existing content.

The expert adds that the threat “was born” last April and that since then its massive distribution on the Internet had not been detected.

Source | Softpedia

Categories
Entradas Mac Os X

Your properly updated Mac could have a vulnerable version of EFI

Or what is the same, while at the operating system level everything is correct, security experts have discovered an indeterminate number of device models with macOS operating systems that have EFI versions that are not updated. This information has been discovered after collecting and analyzing the information sent by more than 73,000 real devices distributed around the world.

It draws attention especially because from Apple they have always boasted of having total control at the software and hardware level of their devices. However, this does not seem so if we focus on the second aspect. That is, in Windows and Linux, it is the user who must worry about correctly updating their device and operating system. However, in the teams of the American company it should not be like that.

We have already verified that more and more threats can make use of out-of-date EFIs, taking advantage of existing vulnerabilities to achieve system persistence and resist computer formatting.

Mac models that are affected by this problem

As you can imagine, it is a somewhat complicated operation, especially since it is not known for sure which models and versions of the same that could be affected. Despite everything, security experts have managed to offer an approximation thanks to the more than 73,000 devices used for this investigation.

Users of these devices are the ones who should be “concerned”:

iMac iMac7,1; iMac8.1; iMac9,1; iMac10,1
Macbook MacBook5,1; MacBook5,2
MacbookAir MacBookAir2,1
MacBookPro MacBookPro3,1; MacBookPro4,1; MacBookPro5,1; MacBookPro5,2; MacBookPro5,3; MacBookPro5,4
MacPro MacPro3,1; MacPro4,1; MacPro5,1

Depending on the existing EFI version on the computer, the user will have a greater or lesser number of vulnerabilities. However, from Apple it seems that we have given excessive importance to these problems.

Few threats that take advantage of these security holes, at the moment

From Cupertino they have a very different vision of not updating the EFI of their computers. To be more exact, they are based on the fact that there are currently no threats that take advantage of this type of security flaw. What they have not taken into account is that in the case of Windows systems we have already verified the power of control over the equipment. We have already indicated that the main purpose is to gain persistence against reboots and formatting, something that is achieved by taking advantage of these vulnerabilities.

Security experts believe that Apple should take action on the matter and get involved to update the EFI of the motherboards of all those computers where possible.

Tool to verify which version of EFI is installed

While security experts are developing a tool to check if our Mac devices are one of those affected by this lack of EFI updates, a developer has created a tool to determine the version of software our system is using. For all those who are interested, the download can be done from the following link.

Categories
Entradas Mac Os X

New macOS apps collect user data

MacOS apps steal user data

Malware Bytes Lab and other security researchers have found evidence of similar problems in applications such as Dr. Antivirus, Dr. Cleaner, Dr. Unarchiver, Open Any Files, and surely many others could collect data as well.

It should be mentioned that these four applications have already been removed from the Apple Store. All of them had been available for download all year round.

Malware Bytes Labs indicates in their report that it has been observed that all the applications mentioned above collect complete browsing history from Safari, Firefox and Google Chrome. Also a complete list of all applications installed and downloaded on the user’s computer.

These apps were developed and published by the security company Trend Micro. This company has other applications currently available in the Apple Store. Security researchers indicate that these applications should be analyzed to see whether or not they collect information from users.

Application approval process

All of this invites reflection. Researchers wonder how the approval process of the Apple store can allow these types of applications to enter. We already know that programs need to be validated to appear on the official site for download. This means that possible malicious programs that could compromise the user’s security cannot enter.

In short, another new incident that affects Apple and its applications. New programs that have been found that collect user data. Information such as browsing history, for example.

Security and privacy are fundamental aspects on the part of Internet users. These are aspects that are highly valued and therefore there are many tools with the aim of protecting equipment. However, applications do not always act as they should. One more example is the one we have seen in this article with macOS applications.

In a previous article, we compiled some of the best security tools for macOS. We show some antivirus and other varieties of software whose objective is to protect the security and privacy of the users. We always recommend having this type of program to avoid a possible system malfunction caused by malware.

Sometimes there is a tendency to think that operating systems like macOS or Linux are not vulnerable to malware. The reality is that any platform can suffer from problems of this type. The point is that cybercriminals set their sights on what has the most users. Hence there are some operating systems where there are fewer threats. But they are not exempt for that.

We leave you an article on how to avoid data theft.