Phew!A lot has been going on with the whole Flashback (or “Flashfake”) malware fiasco, so I’ll do my best to sum everything up…
Conflicting Reports on # of Macs Infected with Flashback Malware
For a short period of time, it appeared that things were improving as Symantec had reported that the number of Macs infected with Flashback malware had dropped from 600,000+ to 140,000.
Kaspersky Lab also reported a decrease in the number of infections, stating that only 30,000 Macs were still under the influence of Flashback (aka Flashfake) malware.
However, these numbers didn’t match up with the latest report from Dr. Web, which still reflected an army of zombie Macs that was still over 500,000 machines strong.
Confused? Good, so was the rest of the world, which lead some to question on whether or not security firms were attempting to scare users into purchasing antivirus software.
So, what’s with the discrepancy?
Apparently, sinkholes setup by Symantec (and other companies) were receiving limited infection counts for Flashback.
Dr. Web reported that a server registered at IP address 74.207.249.7 (and controlled by an unidentified third-party) would communicate with the infected Macs, but never close the TCP connection. This was causing bots to switch to ‘standby’ mode as they wanted for a reply from the server, preventing them from communicating with other command and control servers (or sinkholes setup by various security companies tracking the malware).
That changed the number of infected machines observed by researchers, which ultimately lead to contradicting reports.
Researchers at Intego agreed with Dr. Web’s claims and went on to say that there are likely infected Macs that are not being accounted for and that there was a possibility that more Macs are being infected on a daily basis.
Fueling the fire of uncertainty, Intego also reported that some of the specific domains that Flashback malware attempts to contact resolve to 127.0.0.1 (or localhost), keeping the Mac from reaching the command & control servers and knocking the stats even further off-track.
There’s a New Flashback Variant Out There…
As if that weren’t aggravating enough, Intego also reported yesterday that they’d spotted a new variant of Flashback (Flashback.S) that continues to exploit Java vulnerability CVE-2012-0507, which was patched by Apple around two weeks ago.
Intego warns this latest Flashback variant is actively being distributed in the wild (likely via drive-by-downloads) and does not require a password to be installed.
During installation, Flashback.S will place its files in the user’s home folder, at the following locations:
- ~/Library/LaunchAgents/com.java.update.plist
- ~/.jupdate
Once the installation is complete, Flashback deletes all of the files and folders in ~/Library/Caches/Java/cache to remove the applet from the infected Mac and avoid detection or sample recovery.
Protect Yourself from Flashback Malware
If you haven’t done so already, I strongly recommend that you:
- Apply all of the security updates issued by Apple to remove common variants of Flashback, patch the Java vulnerabilities exploited by the Flashback malware, and disable Java browser plug-ins if they go unused for an extended period of time (Lion only).
- Consider disabling Java on your machine or toggle Java browser plug-ins as needed.
- Install antivirus software on your Mac. Sophos offers a free Mac antivirus solution, so you really don’t have an excuse for not doing it.
- Keep all software up-to-date and be careful of what files you download or websites you visit. Remember, you don’t have to visit a “shady” site to be infected by malware. Cybercriminals often use compromised sites to deliver malware via drive-by-downloads, including Flashback.
What measures are you taking to protect your Mac?


In the past we’ve seen spammers imitate emails from YouTube, Twitter, LinkedIn and Tagged in order to direct users to pharmacy websites, so it’s not all that surprising to find out that they’ve added Foursquare to the mix.


Want to know how scammers trick you into paying for overpriced domain names that you don’t need?
Despite all of the media coverage, free "detect & destroy" tools offered by multiple antivirus vendors and Apple releasing system updates to both remove the malware and patch the Java vulnerability that helped it infect over half-a-million Macs, Symantec says that there are still over 140,000 OS X machines infected by Flashback.
Thinking about finally jumping on the bandwagon by trying out the Instagram app on Android?
One strange thing to note – the .APK file for the fake Instagram app contains multiple copies of a photo of an unidentified man (pictured right), which Sophos speculates is used to change the fingerprint of the file in order to evade detection by rudimentary antivirus scanners.
What would you do if you received an email claiming that the President was a homosexual – and offered a photo as “proof”?

ViewSonic's VA2431wm is an ENERGY STAR 5.0 certified, environment friendly 24" (23.6" viewable) widescreen monitor with integrated speakers.
It seems that spammers are hoping to teach a lesson in fire safety while hoping you forget everything you know about email safety.

SFX Fake AV is an interesting piece of scareware roaming around, attempting to swindle gullible users into forking over dough by claiming they’ve been busted for violating copyright laws and threatening that they may be sued for violating SOPA legislation despite the 

Make sure you take a moment to update your computer today, Mac users.
It’s likely that you’ve heard about how the Flashback malware shattered the façade of superior security in Apple products by infecting upwards of 600,000 Mac systems, majority of which reside in the United States.
We recently switched to Microsoft Office365!
It’s always a good idea to check the requested permissions when installing an application on your Android phone.
Was your Mac one of 600,000 machines infected by the Flashback Trojan?
One, two, account phishers are coming for you...

I hate to break it to you, but YouTube isn’t really thanking you for your video.

Is that a real AT&T wireless bill for over $900 or is that a trick?
Is there a security hole in the Facebook app for iOS and Android that could allow an attacker to easily hijack your Facebook account?
We all know how an innocent web surfing session ![When-Good-Sites-Go-Bad When Good Sites Go Bad [INFOGRAPHIC]](http://www.hyphenet.com/blog/wp-content/uploads/2012/04/When-Good-Sites-Go-Bad.gif)


Contrary to what spammers want you to believe, you cannot score a free pair of TOMS shoes on Facebook.


If you didn’t learn not to click on links embedded in Delta Air Lines spam, then perhaps the new US Airways spam campaign will teach you.