#[1]Latest topics for ZDNet in Security
* Edition:
+ Asia
+ Australia
+ Europe
+ India
+ United Kingdom
+ United States
+ ZDNet around the globe:
+ [2]ZDNet China
+ [3]ZDNet France
+ [4]ZDNet Germany
+ [5]ZDNet Korea
+ [6]ZDNet Japan
Search
What are you looking for? ____________________ (BUTTON) Go
* [7]Videos
* [8]Windows 10
* [9]Enterprise Software
* [10]Cloud
* [11]AI
* [12]Security
* [13]TR Premium
* more
+ [14]Build a Website
+ [15]5G Guide
+ [16]Innovation
+ [17]CES 2020
+ [18]Best Smartphones
+ [19]Executive Guides
+ [20]Best VPN Services
+ [21]Web Hosting
+ [22]See All Topics
+ [23]White Papers
+ [24]Downloads
+ [25]Reviews
+ [26]Galleries
+ [27]Videos
+ [28]TechRepublic Forums
* [29]Newsletters
* [30]All Writers
*
+ [31]Preferences
+ [32]Community
+ [33]Newsletters
+ [34]Log Out
*
*
+ What are you looking for? ____________________ (BUTTON) Go
* Menu
+ [35]Videos
+ [36]Windows 10
+ [37]Enterprise Software
+ [38]Cloud
+ [39]AI
+ [40]Security
+ [41]TR Premium
+ [42]Build a Website
+ [43]5G Guide
+ [44]Innovation
+ [45]CES 2020
+ [46]Best Smartphones
+ [47]Executive Guides
+ [48]Best VPN Services
+ [49]Web Hosting
+ [50]See All Topics
+ [51]White Papers
+ [52]Downloads
+ [53]Reviews
+ [54]Galleries
+ [55]Videos
+ [56]TechRepublic Forums
*
*
+
o [57]Preferences
o [58]Community
o [59]Newsletters
o [60]Log Out
* us
+ Asia
+ Australia
+ Europe
+ India
+ United Kingdom
+ United States
+ ZDNet around the globe:
+ [61]ZDNet China
+ [62]ZDNet France
+ [63]ZDNet Germany
+ [64]ZDNet Korea
+ [65]ZDNet Japan
Mac malware threats are now outpacing attacks on Windows PCs
There's been a big jump in cyber criminals going after Mac users,
although many of the attacks are limited in scope.
*
*
*
*
*
*
[66]Danny Palmer
By [67]Danny Palmer | February 11, 2020 -- 16:35 GMT (08:35 PST) |
Topic: [68]Security
Malware: One in ten macOS users have been targeted by this threat This
threat might be relatively basic, but it is still a headache for many
Mac users.
Macs have often been presented as the safer computing option but now
cyber criminals are increasingly switching their attention towards
those who use Apple computers.
Researchers at cybersecurity company Malwarebytes analysed a year of
data on cyberattacks targeting its customers and found that [69]malware
attacks and other malicious activity targeting Macs have risen
significantly over the past year.
Security
* [70]FBI is investigating more than 1,000 cases of Chinese theft of
US technology
* [71]Windows 7 bug prevents users from shutting down or rebooting
computers
* [72]Lock My PC takes on tech scammers with free recovery key
offering, software withdrawal
* [73]Scam, spam and phishing texts: How to spot SMS fraud and stay
safe
* [74]Cybersecurity: A guide for parents to keep kids safe online
* [75]The security risks of running unsupported Windows 7 (ZDNet
YouTube)
* [76]Best home security of 2020: Professional monitoring and DIY
(CNET)
* [77]How to set up secure credential storage for Docker
(TechRepublic)
According to figures in its [78]State of Malware report, 2019 saw a
significant increase in attacks targeting Macs when compared with the
previous year. In 2019, the average number of "detections" per Mac was
11, compared to an average of 4.8 in 2018, meaning the number of
attacks targeting Macs increased by more than double.
The company said the number of threat detections per Mac was higher
than it was for Windows users during 2019, with an average of 5.8
detections on Windows machines during the 12-month period.
SEE: [79]A winning strategy for cybersecurity (ZDNet special report)
| [80]Download the report as a PDF (TechRepublic)
Researchers note that the make-up of these threats targeting Macs is
very different to those targeting Windows systems, with the most common
threat targeting Mac users coming [81]in the form of adware and other
"potentially unwanted programs" that, while potentially useful as
legitimate software, force themselves onto Macs with aggressive
marketing and invasive tactics.
And while Mac systems are generally good at detecting malware threats,
these low-level campaigns are finding ways to sneak through the
defences of systems in a way that researchers describe as "far
outpacing growth on the Windows side".
"While these threats are not considered as dangerous as traditional
malware, they are becoming a much larger and more noticeable nuisance
for Mac users, who can no longer say that their beloved systems are
immune from malware," says the report.
That's not to say that all malware campaigns targeting Mac users are
low-level, as there [82]are instances of trojan malware targeting Macs,
but while they're not as prolific as the campaigns targeting Windows,
they're still dangerous for the users.
SEE: [83]This latest phishing scam is spreading fake invoices loaded
with malware
And while attacks targeting Mac users are mostly low-level for now, as
cyber criminals evolve their tactics, they could shift their gaze and
attempt more destructive attacks against Apple systems.
"A rise in pre-installed malware, adware and multi-vector attacks
signals that threat actors are becoming more creative and increasingly
persistent with their campaigns," said Marcin Kleczynski, CEO of
Malwarebytes. "It is imperative that, as an industry, we continue to
raise the bar in defending against these sophisticated attacks."
MORE ON CYBERSECURITY
* [84]MacOS Trojan disables Gatekeeper to deploy malicious payloads
* [85]KeySteal exploit attacks MacOS keychain to take all your
passwords CNET
* [86]The Mac malware most likely to attack your PC this year
* [87]How to defend your organization against browser-hijacking
malware and ransomware TechRepublic
* [88]Ransomware, snooping and attempted shutdowns: See what hackers
did to these systems left unprotected online
Related Topics:
[89]Security TV [90]Data Management [91]CXO [92]Data Centers
*
*
*
*
*
*
[93]Danny Palmer
By [94]Danny Palmer | February 11, 2020 -- 16:35 GMT (08:35 PST) |
Topic: [95]Security
[96]Show Comments
LOG IN TO COMMENT
* [97]My Profile
* [98]Log Out
| [99]Community Guidelines
Join Discussion
Add Your Comment
[100]Add Your Comment
More from Danny Palmer
* Security
[101]Phishing scams are costing us more than ever. This trick is
most likely to catch you out
* Security
[102]This latest phishing scam is spreading fake invoices loaded
with malware
* Security
[103]This crafty malware makes you retype your passwords so it can
steal them
* Blockchain
[104]Blockchain elections: How Bitcoin tech could secure your vote
- and save democracy
Please review our terms of service to complete your newsletter
subscription.
[ ]
By registering, you agree to the [105]Terms of Use and acknowledge the
data practices outlined in the [106]Privacy Policy.
You will also receive a complimentary subscription to the ZDNet's Tech
Update Today and ZDNet Announcement newsletters. You may unsubscribe
from these newsletters at any time.
[ ]
You agree to receive updates, alerts, and promotions from the CBS
family of companies - including ZDNet’s Tech Update Today and ZDNet
Announcement newsletters. You may unsubscribe at any time.
By signing up, you agree to receive the selected newsletter(s) which
you may unsubscribe from at any time. You also agree to the [107]Terms
of Use and acknowledge the data collection and usage practices outlined
in our [108]Privacy Policy.
(BUTTON) Continue
Newsletters
See All
See All
Related Stories
* 1 of 3
*
* [109]Microsoft to Office 365 ProPlus users: This new feature cuts
malicious docs risks
Microsoft rolls out previews for an improved experience when using
Office Protected View.
* [110]Phishing scams are costing us more than ever. This trick is
most likely to catch you out
Scammers are still getting big payouts from business email
compromise attacks - but almost two thirds of attacks involve a
much simpler scheme.
* [111]Apple joins FIDO Alliance, commits to getting rid of passwords
Passwords are a notorious security mess. The FIDO Alliance wants to
replace them with better, more secure technology and now Apple is
it them in this effort. ...
* [112]Average tenure of a CISO is just 26 months due to high stress
and burnout
Report: The vast majority of interviewed CISO executives (88%)
report high levels of stress, a third report stress-caused physical
health issues, half report mental health issues. ...
* [113]Intel warns of critical security flaw in CSME engine, issues
discontinued product notices
The CSME system is subject to a severe bug leading to a host of
different exploits.
* [114]Adobe squashes 35 critical vulnerabilities in security patch
update
Arbitrary code execution issues have eclipsed other security
problems in February’s patch round.
* [115]Box Shield now integrates with Splunk for more streamlined
content security
The integration should help organizations get a better
understanding of how potential threats to their content relate to
security risks across other applications. ...
* [116]Play Protect blocked 1.9B malware installs from non-Google
sources last year
The number of user attempts to install malware-infected apps from
outside the Play Store has gone up from 1.6 billion, reported in
2017 and 2018, to 1.9 billion, last year. ...
* [117]Google Nest forcing users into 2FA
The best way to protect privacy and security is to migrate to a
Google account, the search giant says.
[118]ZDNet
Connect with us
© 2020 CBS Interactive. All rights reserved. [119]Privacy Policy |
[120]Cookies | [121]Ad Choice | [122]Advertise | [123]Terms of Use |
[124]Mobile User Agreement
Visit other CBS Interactive sites: [Select Site_____]
* [125]Topics
* [126]Galleries
* [127]Videos
* [128]Sponsored Narratives
* [129]CA Privacy/Info We Collect
* [130]CA Do Not Sell My Info
* [131]About ZDNet
* [132]Meet The Team
* [133]All Authors
* [134]RSS Feeds
* [135]Site Map
* [136]Reprint Policy
* [137]Manage | [138]Log Out
* Join | Log In
* [139]Membership
* [140]Newsletters
* [141]Site Assistance
* [142]ZDNet Academy
* [143]TechRepublic Forums
References
Visible links
1.
https://www.zdnet.com/topic/security/rss.xml
2.
http://www.zdnet.com.cn/
3.
http://www.zdnet.fr/
4.
http://www.zdnet.de/
5.
http://www.zdnet.co.kr/
6.
http://japan.zdnet.com/
7.
https://www.zdnet.com/video/
8.
https://www.zdnet.com/topic/windows-10/
9.
https://www.zdnet.com/topic/enterprise-software/
10.
https://www.zdnet.com/topic/cloud/
11.
https://www.zdnet.com/topic/artificial-intelligence/
12.
https://www.zdnet.com/topic/security/
13.
https://www.techrepublic.com/premium/
14.
https://www.zdnet.com/article/how-to-build-a-website-for-your-business-your-step-by-step-guide/
15.
https://www.zdnet.com/article/what-is-5g-the-business-guide-to-next-generation-wireless-technology/
16.
https://www.zdnet.com/topic/innovation/
17.
https://www.zdnet.com/topic/ces/
18.
https://www.zdnet.com/article/10-best-smartphones/
19.
https://www.zdnet.com/topic/executive-guides/
20.
https://www.zdnet.com/article/vpn-services-the-ultimate-guide-to-protecting-your-data-on-the-internet/
21.
https://www.zdnet.com/article/buying-guide-cheap-web-hosting-services/
22.
https://www.zdnet.com/topic/
23.
https://www.techrepublic.com/resource-library/whitepapers/
24.
https://downloads.zdnet.com/
25.
https://www.zdnet.com/reviews/
26.
https://www.zdnet.com/pictures/
27.
https://www.zdnet.com/video/
28.
https://www.techrepublic.com/forums/
29.
https://www.zdnet.com/newsletters/
30.
https://www.zdnet.com/blog/
31.
https://www.zdnet.com/members/preferences/
32.
https://www.zdnet.com/members/community/
33.
https://www.zdnet.com/members/newsletters/
34.
https://www.zdnet.com/user/logout/
35.
https://www.zdnet.com/video/
36.
https://www.zdnet.com/topic/windows-10/
37.
https://www.zdnet.com/topic/enterprise-software/
38.
https://www.zdnet.com/topic/cloud/
39.
https://www.zdnet.com/topic/artificial-intelligence/
40.
https://www.zdnet.com/topic/security/
41.
https://www.techrepublic.com/premium/
42.
https://www.zdnet.com/article/how-to-build-a-website-for-your-business-your-step-by-step-guide/
43.
https://www.zdnet.com/article/what-is-5g-the-business-guide-to-next-generation-wireless-technology/
44.
https://www.zdnet.com/topic/innovation/
45.
https://www.zdnet.com/topic/ces/
46.
https://www.zdnet.com/article/10-best-smartphones/
47.
https://www.zdnet.com/topic/executive-guides/
48.
https://www.zdnet.com/article/vpn-services-the-ultimate-guide-to-protecting-your-data-on-the-internet/
49.
https://www.zdnet.com/article/buying-guide-cheap-web-hosting-services/
50.
https://www.zdnet.com/topic/
51.
https://www.techrepublic.com/resource-library/whitepapers/
52.
https://downloads.zdnet.com/
53.
https://www.zdnet.com/reviews/
54.
https://www.zdnet.com/pictures/
55.
https://www.zdnet.com/video/
56.
https://www.techrepublic.com/forums/
57.
https://www.zdnet.com/members/preferences/
58.
https://www.zdnet.com/members/community/
59.
https://www.zdnet.com/members/newsletters/
60.
https://www.zdnet.com/user/logout/
61.
http://www.zdnet.com.cn/
62.
http://www.zdnet.fr/
63.
http://www.zdnet.de/
64.
http://www.zdnet.co.kr/
65.
http://japan.zdnet.com/
66.
https://www.zdnet.com/meet-the-team/uk/dannypalmerzdnet/
67.
https://www.zdnet.com/meet-the-team/uk/dannypalmerzdnet/
68.
https://www.zdnet.com/topic/security/
69.
https://www.zdnet.com/article/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software/
70.
https://www.zdnet.com/article/fbi-is-investigating-more-than-1000-cases-of-chinese-theft-of-us-technology/
71.
https://www.zdnet.com/article/windows-7-bug-prevents-users-from-shutting-down-or-rebooting-computers/
72.
https://www.zdnet.com/article/lock-my-pc-locks-horns-with-tech-scammers-offers-free-recovery-keys/
73.
https://www.zdnet.com/article/scam-spam-and-phishing-texts-how-to-spot-sms-fraud-and-stay-safe/
74.
https://www.zdnet.com/article/cybersecurity-a-guide-for-parents-to-keep-kids-safe-online/
75.
https://www.youtube.com/watch?v=saocXhTb7bc
76.
https://www.cnet.com/how-to/best-home-security-systems-for-2020/?ftag=CMG-01-10aaa1b
77.
https://www.techrepublic.com/article/how-to-setup-secure-credential-storage-for-docker/?ftag=CMG-01-10aaa1b
78.
https://blog.malwarebytes.com/reports/2020/02/malwarebytes-labs-releases-2020-state-of-malware-report/
79.
http://www.zdnet.com/topic/a-winning-strategy-for-cybersecurity/
80.
https://www.techrepublic.com/resource-library/whitepapers/a-winning-strategy-for-cybersecurity-free-pdf/?ftag=CMG-01-10aaa1b
81.
https://www.zdnet.com/article/this-simple-malware-still-plagues-one-in-10-mac-users/
82.
https://www.zdnet.com/article/trojan-malware-for-mac-osx-spread-via-compromised-media-player-downloads/
83.
https://www.zdnet.com/article/this-latest-phishing-scam-is-spreading-fake-invoices-loaded-with-malware/
84.
https://www.zdnet.com/article/macos-malware-disables-gatekeeper-to-deploy-malicious-payloads/
85.
https://www.cnet.com/news/keysteal-exploit-attacks-macos-keychain-to-take-all-your-passwords/?ftag=CMG-01-10aaa1b
86.
https://www.zdnet.com/pictures/the-mac-malware-most-likely-to-attack-your-pc-this-year/
87.
https://www.techrepublic.com/article/how-to-defend-your-organization-against-browser-hijacking-malware-and-ransomware/?ftag=CMG-01-10aaa1b
88.
https://www.zdnet.com/article/ransomware-snooping-and-attempted-shutdowns-the-state-of-this-honeypot-shows-what-hackers-do-to-systems-left-unprotected-online/
89.
https://www.zdnet.com/topic/security-tv/
90.
https://www.zdnet.com/topic/data-management/
91.
https://www.zdnet.com/topic/cxo/
92.
https://www.zdnet.com/topic/data-centers/
93.
https://www.zdnet.com/meet-the-team/uk/dannypalmerzdnet/
94.
https://www.zdnet.com/meet-the-team/uk/dannypalmerzdnet/
95.
https://www.zdnet.com/topic/security/
96.
https://www.zdnet.com/article/mac-malware-is-growing-fast-but-its-still-not-as-dangerous-as-the-attacks-on-windows/container
97.
https://www.zdnet.com/members/preferences/
98.
https://www.zdnet.com/user/logout/
99.
http://cbsi.force.com/CBSi/zdnetcommunityfaq
100.
https://www.zdnet.com/article/mac-malware-is-growing-fast-but-its-still-not-as-dangerous-as-the-attacks-on-windows/#comments-6eb57afd-5b2b-489d-97ae-630f9553ed30
101.
https://www.zdnet.com/article/phishing-scams-are-costing-us-more-than-ever-this-trick-is-most-likely-to-catch-you-out/
102.
https://www.zdnet.com/article/this-latest-phishing-scam-is-spreading-fake-invoices-loaded-with-malware/
103.
https://www.zdnet.com/article/this-crafty-malware-makes-you-retype-your-passwords-so-it-can-steal-them/
104.
https://www.zdnet.com/article/blockchain-elections-how-bitcoin-technology-could-secure-your-vote-and-save-democracy/
105.
http://www.cbsinteractive.com/legal/cbsi/terms-of-use
106.
https://www.cbsinteractive.com/legal/cbsi/privacy-policy/highlights
107.
http://www.cbsinteractive.com/legal/cbsi/terms-of-use
108.
https://www.cbsinteractive.com/legal/cbsi/privacy-policy/highlights
109.
https://www.zdnet.com/article/microsoft-to-office-365-proplus-users-this-new-feature-cuts-malicious-docs-risks/
110.
https://www.zdnet.com/article/phishing-scams-are-costing-us-more-than-ever-this-trick-is-most-likely-to-catch-you-out/
111.
https://www.zdnet.com/article/apple-joins-fido-alliance-commits-to-getting-rid-of-passwords/
112.
https://www.zdnet.com/article/average-tenure-of-a-ciso-is-just-26-months-due-to-high-stress-and-burnout/
113.
https://www.zdnet.com/article/intel-warns-of-critical-security-flaw-in-csme-engine/
114.
https://www.zdnet.com/article/adobe-addresses-over-40-vulnerabilities-many-critical-in-patch-update/
115.
https://www.zdnet.com/article/box-shield-now-integrates-with-splunk-for-more-streamlined-content-security/
116.
https://www.zdnet.com/article/play-protect-blocked-1-9b-malware-installs-from-non-google-sources-last-year/
117.
https://www.zdnet.com/article/google-nest-forcing-users-into-2fa/
118.
https://www.zdnet.com/
119.
http://legalterms.cbsinteractive.com/privacy
120.
http://legalterms.cbsinteractive.com/cookies
121.
http://legalterms.cbsinteractive.com/adchoice
122.
https://www.zdnet.com/advertise/
123.
http://legalterms.cbsinteractive.com/terms-of-use
124.
http://legalterms.cbsinteractive.com/eula
125.
https://www.zdnet.com/topic/
126.
https://www.zdnet.com/pictures/
127.
https://www.zdnet.com/video/
128.
http://narratives.zdnet.com/
129.
https://ca.privacy.cbs/
130.
https://ca.privacy.cbs/donotsell
131.
https://www.zdnet.com/about/
132.
https://www.zdnet.com/meet-the-team/
133.
https://www.zdnet.com/blog/
134.
https://www.zdnet.com/rssfeeds/
135.
https://www.zdnet.com/sitemap/
136.
https://www.zdnet.com/reprints/
137.
https://www.zdnet.com/members/preferences/
138.
https://www.zdnet.com/user/logout/
139.
https://www.zdnet.com/about/
140.
https://www.zdnet.com/newsletters/
141.
https://cbsi.secure.force.com/CBSi/knowledgehome?referer=zdnet.com
142.
https://academy.zdnet.com/
143.
https://www.techrepublic.com/forums/
Hidden links:
145.
https://www.zdnet.com/
146.
https://www.zdnet.com/
147.
https://www.zdnet.com/article/mac-malware-is-growing-fast-but-its-still-not-as-dangerous-as-the-attacks-on-windows/#comments-6eb57afd-5b2b-489d-97ae-630f9553ed30
148.
https://www.zdnet.com/article/mac-malware-is-growing-fast-but-its-still-not-as-dangerous-as-the-attacks-on-windows/#comments-6eb57afd-5b2b-489d-97ae-630f9553ed30
149.
https://www.zdnet.com/article/phishing-scams-are-costing-us-more-than-ever-this-trick-is-most-likely-to-catch-you-out/
150.
https://www.zdnet.com/article/this-latest-phishing-scam-is-spreading-fake-invoices-loaded-with-malware/
151.
https://www.zdnet.com/article/this-crafty-malware-makes-you-retype-your-passwords-so-it-can-steal-them/
152.
https://www.zdnet.com/article/blockchain-elections-how-bitcoin-technology-could-secure-your-vote-and-save-democracy/
153.
https://www.zdnet.com/newsletters/
154.
https://www.zdnet.com/members/newsletters/
155.
https://www.zdnet.com/article/microsoft-to-office-365-proplus-users-this-new-feature-cuts-malicious-docs-risks/
156.
https://www.zdnet.com/article/phishing-scams-are-costing-us-more-than-ever-this-trick-is-most-likely-to-catch-you-out/
157.
https://www.zdnet.com/article/apple-joins-fido-alliance-commits-to-getting-rid-of-passwords/
158.
https://www.zdnet.com/article/average-tenure-of-a-ciso-is-just-26-months-due-to-high-stress-and-burnout/
159.
https://www.zdnet.com/article/intel-warns-of-critical-security-flaw-in-csme-engine/
160.
https://www.zdnet.com/article/adobe-addresses-over-40-vulnerabilities-many-critical-in-patch-update/
161.
https://www.zdnet.com/article/box-shield-now-integrates-with-splunk-for-more-streamlined-content-security/
162.
https://www.zdnet.com/article/play-protect-blocked-1-9b-malware-installs-from-non-google-sources-last-year/
163.
https://www.zdnet.com/article/google-nest-forcing-users-into-2fa/
164.
https://www.facebook.com/pages/ZDNet/5953112932
165.
http://twitter.com/zdnet
166.
https://www.linkedin.com/company/zdnet-com
167.
https://www.youtube.com/channel/UCr9QWb5RKLfaunjKHJZAdQQ