contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
Apple responds to Trojan horse advisory
Friday, 09 April 2004, 21:34 GMT

Apple Computer Inc. responded on Friday to an advisory issued by security software-maker Intego Inc. on Thursday. Apple said they were aware of the issue outlined by Intego and that they were investigating. "We are aware of the potential issue identified by Intego and are working proactively to investigate it," said Apple in a statement given to MacCentral. "While no operating system can be completely secure from all threats, Apple has an excellent track record of identifying and rapidly correcting potential vulnerabilities."

In the advisory issued Thursday, Intego said a Trojan horse called MP3Concept (MP3Virus.Gen), exploits a weakness in Mac OS X where applications can appear to be other types of files, according to the company.

Late Thursday night, Symantec Corp. said they were also aware of the Trojan, but noted that the virus has not been found in the "wild."

Read More at ' '

Back to main page


InfoSec Directory
» Bluetooth Security Tools
» Windows/Linux Security - Web Server Role
» Anti-Spyware Software: Securing the Corporate Network
» Using Digital Signatures to Secure Email and Stop Phishing Attacks
» Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues
Latest Press Releases
» GunnAllen Financial Switches to FrontBridge to Ease Message Archiving Processes
» "Mastering FreeBSD and OpenBSD Security": Building, Securing, and Maintaining BSD Systems
» Secured Services and Allegent Technology Group Announce Bristol West Deployment of Network Security Platform
» Netframeworks announces the availability of its SafeSpaceSoftware suite of products and services
» CP-Lab Releases Password Manager XP
» eEye Digital Security Announces Availability of Protection For April Microsoft Security Vulnerabilities
More Articles
» VoIP – What’s the Real Opportunity for Small Businesses?
» Run Your IT Department Like a Business! What?
» Zombie Computers
» HTTP Response Splitting
» An IT Manager’s Insight into Securing Removable Media
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter