MACDefender
MACDefender, or Mac Defender, is a Trojan horse that first appeared in early 2011, masquerading as an antivirus program in an attempt to get users to share their credit card information over an unsecured site. The MACDefender rogue antivirus software targets Mac users via a phishing scam that redirects the users from legitimate sites to fake sites that make the user think their computer has been infected with a virus.
If a user were to click on the bogus link and install the MACDefender software, he or she would be presented with a professional-looking but ultimately fake antivirus program. The MACDefender malware installation could also begin automatically if Safari’s “open safe file after downloading” option had been selected.
Once installed, MACDefender will periodically open pornographic sites in an attempt to make users believe they have a virus on their computer and as a result need to purchase the “registered version” of the MACDefender software with a credit card.
Variants of the original MACDefender Trojan have appeared recently with names such as Mac Security and Mac Protector. Apple has released a software update that automatically finds and removes the Mac Defender malware as well as its currently known variants.
Read Also:
- Coinbit
Coinbit is a Trojan horse designed to steal users’ Bitcoin wallets. Coinbit targets Windows computers by homing in on the standard file location for a Bitcoin wallet before e-mailing the wallet to an address designated by the creator of the malware. The malware ‘s full name is Infostealer.Coinbit, and it was first discovered in the […]
- Computer Systems Administrator
Computer systems administrators install, maintain, and support an organization’s information technology systems. They test system components to ensure that computers, software, and network equipment function seamlessly together. Systems administrators may be in charge of the company’s LAN, WAN, intranet or Internet systems. Some administrators focus on specialist roles such as network security, IT audit, or […]
- Information Technology (IT) Manager
An Information Technology Manager is responsible for implementing and maintaining an organization’s technology infrastructure. Businesses rely on a central information processing system to support efficient data management and communications. The IT manager monitors the organization’s operational requirements, researches strategies and technology solutions, and builds the most cost-effective and efficient system to achieve those goals. A […]
- Network Engineer
A network engineer, also known as network architect, designs and implements computer networks. Unlike network administrators, who perform day-to-day support, the network engineer focuses on high-level design and planning. Network engineers select the appropriate data communications components and configure them to meet user and corporate needs. The construction of a reliable and high-performing network integrating […]
- Mini-SATA (mSATA)
Mini-SATA, or mSATA, is a low-profile interface connector that enables more effective Serial ATA (SATA) integration in small form-factor drives roughly the size of a business card, such as solid state disks (SSDs). mSATA supports data transfer rates of 1.5 Gb/s and 3.0 Gb/s for high performance while enabling compact integration in a wide variety […]