Mac Security Article #3 - Malware, Social Engineering and Scams
Article ID = 83Article Title = Mac Security Article #3 - Malware, Social Engineering and Scams
Article Author(s) = Graham Needham (BH)
Article Created On = 16th July 2012
Article Last Updated = 1st March 2016
Article URL = https://www.macstrategy.com/article.php?83
Article Brief Description:
Information about malware and recommendations for preparing yourself against social engineering tricks and scams
Malware, Social Engineering, Phishing and Scams
This article has the following sections:- Malware
- Social Engineering
- Social Networking Sites
- Scams
- Children On The Internet
- Further Reading and Useful Links
Malware
Malware comes in many different forms but it's ultimate goal is to steal information from your computer usually account details (user names/passwords) and/or financial information (bank account/credit card). If you follow the advice in this document and our series of MacStrategy security articles you will be a lot safer from malware. Some types of malware include:- Viruses and Worms: Viruses when opened/run will infect other software/areas of your computer. Worms are similar but are able to infect other computers on the network automatically without you knowing. There are currently no known Worms for Mac OS X. However, viruses do exist for Mac OS X but they can only infect your computer if they are opened/run hence you should familiarise yourself with our Security - Software article.
- Trojan Horses: For a malicious program to accomplish its goals, it must be able to do so without being shut down, or deleted by you or the administrator of the computer on which it is running. Concealment can also help get the malware installed in the first place. When a malicious program is disguised as something innocuous or desirable, you may be tempted to install it without knowing what it does. This is the technique of the Trojan horse or Trojan. In broad terms, a Trojan horse is any program that invites you to run it, concealing a harmful or malicious payload. The payload may take effect immediately and can lead to many undesirable effects, such as deleting your files or further installing malicious or undesirable software. Trojans can only infect your computer if they are opened/run hence you should familiarise yourself with our Security - Software article.
- Spyware and Keyloggers: These are malware applications that once installed will watch what you do on the computer and record/capture important information (e.g. the username and password you may type in for your online banking service). One of the most common ways that spyware is distributed is as a Trojan Horse (see above) bundled with a piece of desirable software that you download from the Internet. When you install the software, the spyware is installed alongside. Spyware and Keyloggers can only get on your computer if they are opened/run hence you should familiarise yourself with our Security - Software article.
- Rootkits and Backdoors: These are methods of compromising your computer so that it is very difficult to remove the malware that is installed. There are hardly any for Macintosh computers but once again they can only get on your computer if they are opened/run hence you should familiarise yourself with our Security - Software article.
The different ways for malware to get on your computer:
- Someone will sit at your computer and install it - see our Security - Physical article
- Malware will try and install itself on your computer - see our Security - Software article
- You will be tricked into installing the malware on your computer - see the rest of this article
- Malware will attack your computer via a network connection/the internet - see our Security - Networking/Internet/Online Shopping article
- Malware will use a "vulnerable hole" in your software to try and install itself - see our Security - Software article
- Malware will simply install itself on your computer without you knowing or any interaction - if you have followed the advice in our series of MacStrategy security articles this will be virtually impossible
Malware Detection And Removal Software
- PocketBits BitMedic AntiVirus - Malware & Adware Security
- AntiVirus Sentinel Pro - Adware & Virus Scanner - Network Monitor & Protection
- Dr. Safety: Virus & Malware Detection, System Security Protection
- Malwarebytes Anti-Malware (was AdwareMedic)
- sqwarq DetectX
Anti-Virus Software For Macintosh Computers
- Avast Security for Mac
- AVG AntiVirus for Mac
- Avira Free Antivirus
- Bitdefender Antivirus for Mac
- ClamXav
- Clario Clario
- Comodo Antivirus for Mac
- CrowdStrike Falcon Pro for Mac
- FireEye Endpoint Security for Mac
- Intego VirusBarrier X9
- Intego Mac Internet Security X9
- Intego Mac Premium Bundle X9
- Kaspersky Internet Security for Mac
- Sophos Home Free (for Mac)
- Symantec Norton 360 Standard (1 device)
- Symantec Norton 360 Deluxe (5 devices)
- Symantec Norton 360 Premium (10 devices)
- Trend Micro Antivirus for Mac
Social Engineering
Social engineering is all about tricking you into doing something you don't want to do. This type of attack comes in many forms.- Don't click on links in email messages - if you need to go to web site use your personal bookmarks or type the URL into the browser!
- Don't open email attachments including joke pictures, funny movies, PowerPoint files, etc if you don't know who sent the email and even be wary if it is from someone you know (are you certain that it's a legitimate file?).
- Look out for alarmist messages, misspellings and grammatical errors, deals that sound too good to be true or requests for sensitive information like bank account numbers or passwords.
- If you get emails from friends asking for help try contacting them via another method like text/SMS, a phone call to confirm they really are in trouble. Most people will call you for help rather than send an email!
- Use your common sense!
Phishing Information And Where To Report It
- Wikipedia
- report phishing (UK via ActionFraud)
- report phishing (USA via US-CERT)
- report phishing (Worldwide via PhishTank)
- Use OpenDNS phishing protection
- Check a website against the Google "Safe Browing" list (replace the "google.com" text at the end of the URL with a website you want to test)
Web Browsing
Malicious web sites will try and elicit personal/financial information (especially credit card details) from you or they will try to surreptitiously install malware on to your computer (this is known as a drive-by download). Always think before you click:- Configure the security settings in your web browser.
- Whenever you need to enter credit card details double check everything especially that you are on the right web site and make sure the connection to the website is secure.
- Be wary of clicking links or buttons in pop-up windows.
- Don't download files/software unless you are certain that it's legitimate.
- If a web page spontaneously pops up a window that won't go away when you click the close button or press the escape key then close the entire web page/tab. If that doesn't work quit your browser. If that doesn't work then force quit (command-alt-esc) your browser.
- Read up on our Security - Networking/Internet/Online Shopping article.
Social Networking Sites
Social networking sites like Facebook, Twitter, Google+, etc are common ground for malicious attacks and stealing of information. Most of these sites have fairly lax privacy rules (especially Facebook).- Be wary of clicking links or buttons on social networking sites.
- Be careful of what personal data you share and who has access to this data.
- You should think twice about posting information such as address, phone/mobile number, place of employment and other personal information that can be used to target or harass you.
- If the option is available consider limiting access to posted personal data to "friends only" and attempt to verify any new sharing requests either by phone or in person.
- When receiving content (such as third-party applications) from friends or new acquaintances, be aware that many recent attacks have leveraged the ease with by which content is automatically accepted within the social network community. This content appears to provide a new capability, when in fact there is some malicious component to it.
- Regularly review the security/privacy policies and settings available from the social network provider to see if new features are available to protect your personal information.
Scams
- If an offer sounds too good to be true, it probably is
- If there's an offer of a cheap Mac, iPhone, iPad or iPod then it's probably a scam
- If there's a chance of winning a Mac, iPhone, iPad or iPod without you doing anything other than clicking or link or just entering some personal information then it's likely to be a scam
- If you can't think of a good reason why you were singled out for a windfall or some prize money, it's probably a scam
- Don't believe things just because they are stated in an email or on a website
- Don't click on alluring links without thinking through the possible consequences
- Never provide personal or company information unless you are certain of the identity and authority of the person requesting it
- Never reveal personal and financial information via email or by following links to sites to enter such information
- If you doubt the legitimacy of email, contact the sender by a separate channel that you look up
- Check URLs of sites you visit to be sure they are the URLs you actually want, not a similarly named one that may be malicious
- Don't send sensitive information over the Internet if you aren't confident of the site's security
Children On The Internet
Set up a dedicated, restricted account on the computer using parental controls. CEOP's online safety tips for parents:- Know what your children are doing online
- Get them to show you how to do things
- Help them understand not to give any personal information to online friends
- Teach them to ignore spam
- Teach them to ignore files sent by people they don't know
- Teach them some people lie online
- Tell them to keep online friends online
- Keep talking so they know they can always tell you if something makes them feel uncomfortable
- Show children how to block people online and how to report them
Further Reading and Useful Links
- The Safe Mac web site
- Safer Internet UK organisation
- Take the Safer Internet UK test
- CERT-UK UK government online security organisation
- Report online fraud in the UK at Action Fraud
- Get Safe Online organisation
- Snopes - urban legends reference pages
- The Stop Badware Online organisation
- Stop Think Connect organisation
If this information helped you or saved you time and/or money why not donate a little to us via PayPal?
All proceeds go directly to MacStrategy / Burning Helix to help fund this web site.
All proceeds go directly to MacStrategy / Burning Helix to help fund this web site.
If this information helped you or saved you time and/or money why not donate a little to us via PayPal?
All proceeds go directly to MacStrategy / Burning Helix to help fund this web site.
Go to this
web page
to donate to us.
All proceeds go directly to MacStrategy / Burning Helix to help fund this web site.
Go to this
web page
to donate to us.