{"id":692,"date":"2012-04-09T13:10:03","date_gmt":"2012-04-09T19:10:03","guid":{"rendered":"http:\/\/wp.natsci.colostate.edu\/cnsit\/?p=692"},"modified":"2022-05-26T12:20:22","modified_gmt":"2022-05-26T18:20:22","slug":"macs-and-anti-virus-and-a-trojan-warning","status":"publish","type":"post","link":"https:\/\/cnsit.colostate.edu\/kb\/macs-and-anti-virus-and-a-trojan-warning\/","title":{"rendered":"Macs and Anti-virus &#8211; and a Trojan warning"},"content":{"rendered":"<p><strong>UPDATE<\/strong>: Apple Software Update (top left Apple Menu -&gt; Software Update) now has a patch for the Flashback malware &#8211; it will appear as something similar to &#8216;Java for OS X 2012-003&#8217; &#8211; Be sure to run software update to protect yourself from this vulnerability!<\/p>\n<p><strong>SUBNET MANAGER LIST MESSAGE FROM ACNS BELOW<\/strong><\/p>\n<p>CSU has begun to see infections of Mac OS X, of the kind talked about in a variety of recent news stories, including this blog post about the &#8220;Fakeflash\/Flashback&#8221; Trojan from the New York Times last Friday:\u00a0 http:\/\/bits.blogs.nytimes.com\/2012\/04\/06\/widespread-computer-virus-indicates-mac-users-no-longer-safe\/ .<\/p>\n<p>Apple describes the Java-based vulnerability here: <a href=\"http:\/\/support.apple.com\/kb\/HT5228\">http:\/\/support.apple.com\/kb\/HT5228<\/a> and has produced a patch which should be applied as soon as possible, ideally through regular application of Apple Software Update. The Symantec client for Mac is available for purchase at RamTech for CSU-owned computers, and for free download from the ACNS web site for personally owned computers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>UPDATE: Apple Software Update (top left Apple Menu -&gt; Software Update) now has a patch for the Flashback malware &#8211; it will appear as something similar to &#8216;Java for OS X 2012-003&#8217; &#8211; Be sure to run software update to protect yourself from this vulnerability! SUBNET MANAGER LIST MESSAGE FROM ACNS BELOW CSU has begun [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":693,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5,11],"tags":[],"class_list":["post-692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple","category-general-cnsit","category-security-news"],"_links":{"self":[{"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/posts\/692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/comments?post=692"}],"version-history":[{"count":2,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/posts\/692\/revisions"}],"predecessor-version":[{"id":4545,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/posts\/692\/revisions\/4545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/media\/693"}],"wp:attachment":[{"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/media?parent=692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/categories?post=692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/tags?post=692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}