One more malware have been spotted for the Apple Mac machine. This time Trojan.iServices.B which gets into the system, open the backdoor in Mac machines and connect them to a zombie network. This malware is distributed through pirated copies Adobe Photoshop CS4 available at warez channel.

Few days back another malware of the same type was spotted in pirated copy of Apple’s iWork. The malware iServices.A also connects the machine to a botnet network.

Over the last one and half years Mac users are no longer the feeling the security of being on the Mac platform. OSX.RSPlug.A, which target Mac porn hunters, AppleScript-THT Trojan which exploited the vulnerability of apple remote desktop agent all target Macintosh machines. It’s interesting to note that Mac advised its users to install anti virus software back in November, 2008 on its website and quickly withdrew the post.

Apple recommended Intego VirusBarrier, Symantec Norton Anti-Virus 11 for Macintosh and McAfee VirusScan for Mac as possible antivirus products. AVG, Avast! Home Edition and Clam AV also provide anti virus software solutions for Mac Platform.

Considerably smaller market share of Mac made it less of a target to cyber criminals till now, but may be not any more!

Explore More

Critical Blind SQL injection in ChartNexus.com

PlanetCreator has reported another critical Blind SQL Injection (vulnerability) on http://www.starinvestorrelations.com/ which owned by FiNEX Solutions Pte. Ltd. (“FiNEX Solutions”) powered by http://www.chartnexus.com/ This vulnerability has been alerted to :-

Security Alert to www.mtv.co.kr, MySQL Injection

Hi, http://www.mtv.co.kr Webmaster This is PlanetCreator’s Security Te@am & Hackers Group, PlanetCreator has reported Critical SQL Injection vulnerability on http://www.mtv.co.kr/ Website. Informed to [email protected] Some of your Web’s Data Information

XSS: Types and Uses

We all know that XSS is the most common exploit to be found in any website. However, different forms of XSS have different uses, as i will cover in this