Hallelujah, Apple finally does something self publishing company tool to remove malware Flashback from Macs attack.
Apple released updates to fix is that Java will detect and remove the infected computer from a Flashback on 12 apr. This is the third update issued by the company this week as the first two off the risk that Flashback is exploiting the Java based first person. Updated with important messages when closing a vulnerability the same update, but total removal tool.
"This security update removes Java variable common malware Flashback," Apple wrote in support.
Disable Java plug-inInteresting enough. Apple's update will disable the Java plugin on all Web browsers (not just Safari) and disable Java applets by default, even if the user enables the automatic operation of the applet via Java Preferences application manually, it will automatically be disabled if not run Java applets within 35 days, according to Apple.
"Check if Java plug-in found running Java applets not belabor it again it will close the applet Java," Apple wrote.
On the one hand, This is not a bad idea to close the vector of attack for many users of Macs is a virus, a Trojan is installed it once for whatever reason and forget they are on their computer. Many security experts have long encouraged users to remove Java, except that they really know what they need because the Web site that uses Java applets are less than ever before. To disable automatic execution of Java applets are disabled as one has been uninstalled Java without doing so.
Too little, too late?Conversely, it feels a little reactive Apple has been roundly criticized for the delay in the Oracle Java vulnerability patching bugs closed for the Mac platform, not all week but Apple didn't release many fixes for Mac OS X until researchers disclosed through half a million infected machines. This fix only prevents future infections of Java, but does not highlight the fact that Apple seems out of step when it comes to the security of the platform supposedly-invincible.
Apple has delayed a little with this tool as several security companies have already released their removal tool. Flashback "while a dream to see Apple do to get rid of Trojan Flashback is a minor party, said Michael Sutton of security research at Zscaler ThreatLabZ.
Pascal, F-Secure AV, MacKaspersky Web site open that users cannot visit to make sure they are installed. Users enter their computer on which www.flashbackcheck.com UUID will be compared with the database of Kaspersky's virus known. If a UUID exists in the database, users can use the free utility Kaspersky Removal Tool to scan and remove Flashback malware.
F-Secure also removed itself to remove tool is available as a Zip file on a Web site, users just need to cancel zip package and run the tool. If it finds an infection, they are quarantined in a Zip file, encryption and password protection.
Dr. Web company that emphasizes originally of infection has verified online scanner for OS X Anti-Flashback and Light tools to detect and eliminate them now also includes Symantec OSXFlashback.K Removal Tool.
Mac antivirus tools, such as the one from Sophos and Kaspersky, has been updated to detect a Flashback while Apple has not added a check for Flashback.K malware contained within the scanner XProtect.
Better late ...
Apple moves pretty quickly after a promising start removal tool, so the better week than not but a man delays once told "well, never call Apple to learn lesson.
Comments