Feeds

Apple hunts down Win and Mac flavoured Safari flaws

Return of the Mac attack Trojan

Top 5 reasons to deploy VMware with Tegile

Apple has patched six security holes in its Safari web browser software.

Safari version 4.0.3 fixes separate buffer overflow bugs in the CoreGraphics and ImageIO components of the Windows version of the browser that each create a critical code injection risk. In each case, visiting a maliciously crafted website with an unpatched browser creates a drive-by download risk.

Mac users also need to update to Safari version 4.0.3 because of a critical WebKit vuln, which poses a similar 'visit a hacker-controlled website and get pwned' danger. The Mac version of the browser also fixes two lesser WebKit flaws, while a problem that means a maliciously crafted website may get promoted into Safari's at-a-glance Top Sites view is fixed in both Win and Mac flavours of Safari.

The Mac and Windows updates to Safari also fix various stability and compatibility bugs as explained in more depth in Apple's advisory here, and a bulletin from the Internet Storm Centre here.

In almost related Apple security news, Trend Micro warned on Tuesday about a Trojan horse for Mac OS X that changes DNS settings. The malware comes disguised as a MacCinema Installer.

Once infected, a victim’s surfing can be hijacked and redirected towards websites selected by hackers. The malware - dubbed JAHLAV-D by Trend - is the latest variant in a Mac family previously last spotted back in June.

Windows malware strains dwarf Mac virus variants by several orders of magnitude, but that's not to say that Mac malware doesn't exist. VXers are taking more interest in Macs as the platform has grown in popularity. ®

Beginner's guide to SSL certificates

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.