Apple Quietly Pulls Claims of Virus Immunity

Page 5 of 6 FirstFirst ... 3456 LastLast

  1. Posts : 428
    Windows 10 Pro 64 bit
       #40

    pparks1 said:
    Wordsworth said:
    I just got a virus this week, after having not had one since the mid 90s and that one coming off a floppy from work. The virus this week is called Live Security Platinum. I'm making another thread concerning it so as not to hijack this thread, but I was looking for some weight lifting advice and clicked on a link in Bing search which then took me to a site that did not look suspicious. As I started to read, Malwarebytes came up with a message that an attack had been attempted and I then clicked on the Quarantine button, and left the site quickly. Still, the damn thing infected this box. I've been on the Net solidly since 1996 so my run of 16 clean years ended this week.
    Thanks for sharing. These are the types of things that always make me skeptical of the person who says they have NEVER had an issue and the only protection they need is common sense.

    A friend of mine at work, got hit, just like you did searching the web for sunglasses. The only questionable thing they did, (IMHO) was use IE for that search.

    An IT buddy at work was googling and Exchange error and clicked on a link and a picture of Emma Watson on a crapper popped up on his screen and his machine was hosed. Once again, IE was the browser being used.

    Around 2.5 years ago, i got hit with something when I was searching on a local radio station talk show that was going away in my area. (So, you think you are secure and don't need precautions). It didn't ultimately really damage anything and I didn't have to start over, but I won't claim that it didn't happen.

    Using something like Sandboxie "could" have helped to prevent something like this from happening...but always keeping my environment sandboxed while at work trying to accomplish tasks quickly isn't always convenient. Plus, my issues are so few and far between, that going to extra lengths usually means I spend more time protecting myself than actually fixing myself if a problem "were" to arise.
    I've been thinking of using Sandboxie of late then this happens. Thankfully this box appears to be clean now. I've always been careful with websites and emails sometimes to the point of absurdity; I think the law of averages just played a hand.
      My Computer


  2. Posts : 137
    Windows 7 Ultimate x64 / OS X Snow Leopard 10.6.8
       #41

    lehnerus2000 said:
    Stratos said:
    I did not imply such in that context, that's just your unique interpretation.
    Here's what you said:
    Stratos said:
    It requires several user inputs thus not passive.
    You're confusing my comments with the wrong context. This reply was in regards to your comment that I faulted Mac users because they plugged their computers in, turned it on and surfed the internet. I made no such implications, that was your unique assumption.

    The comment "it requires several inputs..." is in regards to how it's not a true drive-by, passive attack. Flashback does present itself as an applet (exploiting a weakness in Java code for Macs) which needs the user to click either "Ok" or "Update" in order to run the code.

    lehnerus2000 said:
    You keep saying, "the user did something, therefore it's not a passive attack".

    Your definition of a "passive attack" must therefore mean "Worm".
    If not, what is a "passive attack"?
    A true passive "drive by" attack would only require the user to visit a booby trapped website. In other words just loading up that particular web page is all that's needed. In many pwn2own hacking contests, the contestants would show up with a script that was prepared days, weeks, months ahead of the contest and attempt to run existing code that's on the system (for example Calculator). What this demonstrates is that a rogue executable could be anywhere within the computer and the web page provides the catalyst in order to run it. This demonstrates how browsers are a common attack vector for exploitation. Plug ins, addons and extensions are weaknesses if written poorly (i.e. Flash, Java).

    A worm by definition is a standalone, self-replicating code that (unlike a true virus) need not be part of another application/program. Must it be a worm? No. Worms are one of the most easily detectable types of malware and the component that allows itself to self replicate is not necessary if the delivery method was through a rogue website. It would be easier for a malware coder to deliver a seemingly innocent code which contained dormant, malicious code and have the trigger provided through a website.

    lehnerus2000 said:
    You have constantly blamed the Mac users for getting infected ("it's their own fault").

    OTOH, I am not blaming the Mac users for getting hit by a Drive-by attack.
    Especially since they were told that their systems are immune to malware.
    There were no blame put upon anyone, that was your assumption again, I'm not sure why you insist that there's any kind of blame since I did not mention it. When I said you think in such binary terms, that means you think in absolutes or "it must be this or that". Situations present itself in many ways whether its faulted to you or not, what matters is your level of preparation and your ability to deal with it. If you didn't get my Forrest Gump comment, all it means is "____ happens".

    lehnerus2000 said:
    Problems don't occur without a cause (Cause and Effect).

    The cause in the case of malware might be:

    • Bad design
    • Sloppy coding
    • User foolishness/ignorance

    A perfect OS (or other software package) would have no exploits and therefore no security updates.
    As such, the only way to hijack such a system would be to trick users into installing malware.

    The only thing users can really do (assuming they actually want to use their computers) is make sure they have:

    • All the latest security patches for their OS and other software.
    • Their firewall turned on.

    If they run Firefox, they should install NoScript.
    Again you're taking context and skewing it completely off the mark, not sure why you need to discuss "cause and effect" here since it wasn't mentioned. It's your insistance that I'm placing fault upon the user, I made no such claim, stated it and yet you keep clinging onto it.

    Malware's effectiveness lies in a multitude of possibilites. It starts with the knowledge the coder has with its projected target systems. Then in combination it uses existing vulnerabilities which may or may not be known (such as zero days) and unresolved (unpatched applications). It often relies on steering users to an area in which the code awaits delivery (booby trapped website, IRC, torrents, emails, etc.) and as such exploits the user's level of awareness (in varying degrees) in order to complete the delivery and execution of the rogue code.

    There's no such thing as a perfect OS, not sure why you felt it needed to be mentioned. OSX has one major advantage in the area regarding malware over Windows and it's due to how malware is most often profit-driven and it goes hand in hand with just how large the actual Windows marketshare is (in comparison to OSX in all flavors). If the Windows to OSX marketshare ratio were, for example 1:1 I believe you'd see a much larger explosion of malware occurrence with OSX.

    lehnerus2000 said:
    Stratos said:
    If you walked outside your home and a rogue lightning bolt hit you, you think there has to be some fault involved?
    You obviously do.
    Stratos said:
    It requires several user inputs thus not passive.
    I don't. A common user has a need to use the internet and you can't realistically expect to block something the user must use as in providing a patch to disable the internet. You need to understand that with all things, risks are involved. If you can eliminate all risks then I think your solution of simply not using the computer may be one of the most effective but it's my belief that it's an excessive, overreaction. Since no OS is perfect and the internet practically endless, there's always some sort of risk using it.

    People could easily implement controls like running antivirus/antimalware software to reduce some of the risks. You could also check on websites which help educate you on what's considered risky and how to deal with them in order to further reduce your risk. The goal is to minimize the risk level to the lowest point. Risks are assessed and dealt with the combination of its severity and likelihood of it happening.
      My Computer


  3. Posts : 137
    Windows 7 Ultimate x64 / OS X Snow Leopard 10.6.8
       #42

    jimbo45 said:
    Hi Guys

    What are you people actually running

    I still say with minimal AV (currently MSE on W7, WD on W8 and NONE on SUSE linux 11) I've NEVER had a virus.

    (And I have used some torrent sites in the past too)

    So please --what are you actually doing that gets your machine(s) infected.

    I have only ever had one rule in all the years I've been using the internet

    NEVER OPEN an e-mail attachment that you don't know where it's coming from or open links within legit emails unless you are sure the url is genuine.

    Might be simple but this has NEVER given me a problem over years and years of using the Internet.

    Cheers
    jimbo
    Jimbo on my normal PC's, I currently use Kaspersky. It's a tad heavy on resource use but I had a 3 yr subscription that doesn't end until 2014. On my ultralight portable Thinkpads, I use the latest MSE.

    On my Macs I tried several (there's not a whole lot of choices unlike the Windows platforms) and discovered that ClamXAV is a very good, robust yet simple application. It is currently set to run on-demand only. I like how it doesn't require anything beyond user level access and a compromised signature file will have no access to key system files and processes (meaning recovering from such a compromise would be very easy), should it happen.

    Coram Daes said:
    Seems you are forgetting the scenario with poisoned ads on innocent sites. meh
    Depending on how you look at things, many sites (even legit ones) may involve "poisoned" ads.

    Coram Daes said:
    The whole reasoning behind having or not having Java is ludicrous.

    As Oracle claims: 3 billion devices runs Java. Java is almost a must on any pc or mac. Lots of software apps are based on Java, the software you use to be able to communicate between many cell phones and the computer is Java. I could also bring up the example of a multi billion dollar global corporation within car manufacturing that bases just about all its applications on Java. Maybe others do as well, I really dont know. You go service your car, the application used to update your cars ECU firmware and read stuff from it is most likely based on Java.
    Ah, just the comment I was waiting for, thanks for that Coram Daes.

    Yes there's a huge abundance of Java and yes many people use them. The problem with what's said is how either PC or Mac computers must use Java and that's not entirely true. There's a need for Java "if" you need to access to their controls and/or content. I don't believe in installing components onto any machine that you have no use for.

    Speaking for myself, I have had no need for Java on my Macbook (yet) however should there be a need for it, the software's readily available. The reason for me not having it in the first place had less to do with how it's Java than it was about how I had a small 128GB SSD and decided to trim out everything I thought I did not need in order to conserve space. Since trimming out Java I discovered I did not need it and knew how to access typical Java services in other ways. Since then I doubled the capacity of my SSD and still found no need to have Java on the Mac. In any case if there's a need for it, I would likely reinstate/reinstall Java then disable or remove it when I no longer need it.

    However even in the case of having Java installed (I could easily reinstall it on my machine but chose to leave it out), there's mitigation you as a user are able to implement. You could go into Java preferences and disable its ability to hang onto temporary files for example. It may have the residual effect of slowing Java interaction down a tad but if you're like me using a decent internet connection and a SSD (solid state drive), the performance hit is not noticeable.

    Java itself is not bad, that is has many exploitable holes (as proven in the past) is.

    Coram Daes said:
    Not forgetting the explosion of iPads on several corporate networks (driven by Business, not by IT) and there you have loads of Macs needing Java to be able to logon the company network (just take Citrix as example). IBM runs Java. Lots of corporate intra- and extranets are built upon IBM WebSphere which is...ah! Java.
    iPads don't support Java, never has, but that may not be what you were saying but I felt it needed to be said for the following.

    Corporate networks (unlike your home network) is often based on a managed system. Such managed systems may employ domain access controllers, user account permissions, custom browser settings, antivirus/antimalware server, mail (MS Exchange) server, intranet web page (internal company website), firewall(s) and a limit to what kind of applications can be installed on client-side computers. These are all controls meant to mitigate risks. iPad users can use separate client apps to login and/or use VPN to access the corporate/company network (if it's setup to accept VPN logins). Since there are more mobile device use out there to include smartphones and tablets, there has to be other ways to access the network besides using Java.

    For example US Gov't computers on their network won't allow the user to go out and install anything that's not already on the computer. If they need a particular program that's missing, they must call their local help desk, present their case and if they agree that they need additional software, it will be pushed from the help desk via remote access onto that machine and that machine only (and only for that user that's currently logged on) on a case-by-case basis. To an administrator that keeps things controllable and predictable.
      My Computer


  4. Posts : 126
    W10 Pro
       #43

    I do not own an iPad myself, but I am suffering from having to support business users with iPads that are not on the corp network (yet) accessing it via VPN. They need to get an App called Citrix Connector. Since that same connector software is used when connecting via VPN for all devices, I assumed it was the same software, adapted to platforms. It seems I may have been wrong assuming it was a Java based software for iPads, it is, however, for PC's and Macs in general.

    Limitations are set of course, your example from US Gov is roughly implemented by us as well. But Java comes preinstalled in the OS images (still XP btw!, 7 coming this winter), since it is required for so many key aplications. Users may alter some setting, but they generally haven't the foggiest about what the hype is about, not would they get even 10% of the content of this thread.
      My Computer


  5. Posts : 137
    Windows 7 Ultimate x64 / OS X Snow Leopard 10.6.8
       #44

    Coram Daes said:
    I do not own an iPad myself, but I am suffering from having to support business users with iPads that are not on the corp network (yet) accessing it via VPN. They need to get an App called Citrix Connector. Since that same connector software is used when connecting via VPN for all devices, I assumed it was the same software, adapted to platforms. It seems I may have been wrong assuming it was a Java based software for iPads, it is, however, for PC's and Macs in general.
    Agreed, even I'm not all that familiar with all types of integration of mobile tablet devices (not just iPads) with existing networks, I've seen about a handful and the configuration and administration are nothing alike. For us VPN access is allowed but is limited. Applications can't be run remotely but you can view and download files and email on whichever network share folder/NAS that's available to your user account.

    I have no idea what Citrix Connector is like nor how it interacts with everything else so no comment there.

    Limitations are set of course, your example from US Gov is roughly implemented by us as well. But Java comes preinstalled in the OS images (still XP btw!, 7 coming this winter), since it is required for so many key aplications. Users may alter some setting, but they generally haven't the foggiest about what the hype is about, not would they get even 10% of the content of this thread.
    From an IT support perspective, users are often treated similarly as children... as in "they don't know any better" so they require constant monitoring. Java, Flash, browsers... there's many vectors of exploitation even if the OS itself is very robust and secure. On a (corporate) managed system, it is the IT section's responsibility to push all relevant updates to all client machines. I'm sure you've seen some images used today which use IE7 or IE8, Adobe Reader 9, run Office services with macros enabled by default, etc. There's a lot of aloof administrators out there simply not doing what they're supposed to do.

    Malware is often assessed as a risk, as such we deal with each risk model with a balance between severity and probability. A couple of previous posters seem to me as if they took offense to my posts perhaps taking it as such like I'm trying to say that OSX is better than Windows... in some ways it is and some ways it's not.

    I posted earlier that while OSX is more secure than Windows on a 1 on 1 standpoint, that alone isn't very meaningful because even if Windows is more exploitable, there are significantly more tools out there to deal with the situation, kind of like owning a typical gasoline car, if it breaks there's many places that can help you. So in this case the probability of running into malware may be higher but there's a lot of tools to help keep you safe(r). IMHO this is a huge plus for Windows users.

    OSX on the other hand may experience less occurrences than Windows in regards to malware but because there's not many tools/resources out there, a successful infection is much more severe, kind of like having problems with your hydrogen fuel cell car, not many places can really help you except for where you bought it. Flashback wasn't very serious, it just took a lot of people by surprise that an estimated 600,000 machines were affected. Many of them didn't know how to deal with it and since there's no Malwarebytes, Superantispyware, HitmanPro, etc. for Macs, many users were left simply waiting for Apple to provide a Java update fix. This is a big fat minus for OSX users.
    Last edited by Stratos; 02 Jul 2012 at 01:59.
      My Computer


  6. Posts : 126
    W10 Pro
       #45

    I suspect that the increase of Apple devices popularity will also significantly raise their target factor, giving a lot of people a bitter wake up call to circumstances that we have seen in Windows for many years.
      My Computer


  7. Posts : 137
    Windows 7 Ultimate x64 / OS X Snow Leopard 10.6.8
       #46

    Very true. Honestly I can't wait for the next major malware to affect a large amount of OSX users. I'm always curious to see what exploit each malware uses.
      My Computer


  8. Posts : 4,049
    W7 Ultimate SP1, LM19.2 MATE, W10 Home 1703, W10 Pro 1703 VM, #All 64 bit
       #47

    On a lot of sites I visit, "user interaction" is code for "it's the user's fault".

    As a result, when I see that term I assume that the writer is saying "it's the user's fault".

    If you're saying that is not what you meant, then I retract the statements I made relating to "user interaction". :)
      My Computer


  9. Posts : 137
    Windows 7 Ultimate x64 / OS X Snow Leopard 10.6.8
       #48

    IMHO "fault" lies in two key places, first the originator(s) of the malware and a user who willingly chooses to "jump into the fire", gets burned and cries foul. There is a tertiary source of fault and that is the software manufacturer who does little to nothing to provide a patch for a known (especially publicly known) vulnerabilities.

    I don't consider a user accidentally encountering malware (as in drive-bys, etc.) as the source of any fault just because they're simply just using their computers. My "struck by lightning" example explains that I don't fault a user for stepping outside their home and randomly encountering an unfortunate situation.

    The war on malware is sort of a back-and-forth battle, blackhat exploiters are always on the hunt to find vulnerabilities in order circumvent protection measures on target systems and whitehat researchers are either racing to provide patches to vulnerabilities before they're exploited or playing catch-up in reaction to zero-days which have already been exploited.

    User interaction simply means it needs input from the user to "do something" in order to complete the process of getting the malware onto the computer. A simple way to look at it is through a boobytrapped popup which presents itself as "Hi you are #1000 and just won a brand new iPad, click here to claim your prize!", you click on the ad which results in the malware completing its transfer onto your machine.

    I hope this clears up any confusion.
    Last edited by Stratos; 03 Jul 2012 at 22:43.
      My Computer


  10. Posts : 4,049
    W7 Ultimate SP1, LM19.2 MATE, W10 Home 1703, W10 Pro 1703 VM, #All 64 bit
       #49

    Fair enough


    Stratos said:
    I hope this clears up any confusion.
    Fair enough.
    I apologise.

    Original posts edited.
    Last edited by lehnerus2000; 03 Jul 2012 at 22:36. Reason: Fixed Quote
      My Computer


 
Page 5 of 6 FirstFirst ... 3456 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:48.
Find Us