Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Mac malware in the wild

2 of 6 NEXT PREV
  • 6230018.png

    Published: May 6, 2011 -- 12:39 GMT (05:39 PDT)

    Caption by: Ed Bott

  • 6230012.jpg

    Published: May 6, 2011 -- 12:39 GMT (05:39 PDT)

    Caption by: Ed Bott

  • 6230013.jpg

    Published: May 6, 2011 -- 12:39 GMT (05:39 PDT)

    Caption by: Ed Bott

  • 6230014.jpg

    Published: May 6, 2011 -- 12:39 GMT (05:39 PDT)

    Caption by: Ed Bott

  • 6230015.jpg

    Published: May 6, 2011 -- 12:39 GMT (05:39 PDT)

    Caption by: Ed Bott

  • 6230016.jpg

    Published: May 6, 2011 -- 12:39 GMT (05:39 PDT)

    Caption by: Ed Bott

2 of 6 NEXT PREV
Ed Bott

By Ed Bott | May 6, 2011 -- 12:39 GMT (05:39 PDT) | Topic: Security

  • 6230018.png
  • 6230012.jpg
  • 6230013.jpg
  • 6230014.jpg
  • 6230015.jpg
  • 6230016.jpg

Want proof that the bad guys are starting to target Mac users? Take a look at this series of screens, which show an attempt to convince a user to install a fake antivirus program that has a nasty payload

Read More Read Less

Published: May 6, 2011 -- 12:39 GMT (05:39 PDT)

Caption by: Ed Bott

2 of 6 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Ed Bott

By Ed Bott | May 6, 2011 -- 12:39 GMT (05:39 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OnlyKey hardware security key

    This is the ultimate security key for professionals.

  • SoloKeys Solo V2

    Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums