[LINK] Spyware trojan hitching ride on third-party Mac screensavers

Stilgherrian stil at stilgherrian.com
Wed Jun 2 20:09:21 AEST 2010


Gosh. I was just making the one specific observation that that socially-engineered attacks are now substantially more common than those targeting vulnerabilities. Anything else is trying to make too much of that little factoid, I reckon.

Stil


On 02/06/2010, at 7:40 PM, Kim Holburn wrote:
> 
> On 2010/Jun/02, at 5:50 PM, Stilgherrian wrote:
> 
>> On 02/06/2010, at 4:53 PM, Kim Holburn wrote:
>>> And they still have to get [Mac] users to install malware  
>>> themselves.  They
>>> are getting sneakier about it though.
>> 
>> This is now pretty much the case with Windows malware too. Most  
>> users have anti-virus software, and Vista and Windows 7 are more  
>> locked down that XP and its predecessors.
>> 
>> I was at Microsoft HQ in Redmond last week, speaking with a number  
>> of their security people. The figures they're seeing is that roughly  
>> 30% of infections are coming from drive-by downloads (things  
>> automatically installed via, say, rogue ActiveX controls embedded in  
>> a web page)
> 
> So they admit that 30% of infections are still are still from things  
> that shouldn't happen and which are directly the responsibility of  
> Redmond.  There is no way a browser should be allowing this sort of  
> activity.  After all this time, it's astonishing that it can still  
> happen at all.  It's still not right.
> 
>> and 70% are socially-engineered malware (i.e. requires user action  
>> to install).
> 
> What sort of user action?  Just clicking a button or having to enter  
> an admin password?
> 
> Wwhat is the percentage of zero-day exploits?  They don't appear to be  
> mentioned.
> 
> There is still the fact that there are many, many machines running  
> Windows unpatched, many pirated.  The decision to not allow pirated  
> windows machines to be patched means there is a huge base of  
> compromised machines, a situation itself which greatly increases the  
> danger for everyone else (who runs windows).
> 
> 
> -- 
> Kim Holburn
> IT Network & Security Consultant
> T: +61 2 61402408  M: +61 404072753
> mailto:kim at holburn.net  aim://kimholburn
> skype://kholburn - PGP Public Key on request
> 
> 
> 
> 
> 
> 
> 
> 
> 
> _______________________________________________
> Link mailing list
> Link at mailman.anu.edu.au
> http://mailman.anu.edu.au/mailman/listinfo/link





More information about the Link mailing list