{"id":10293,"date":"2013-02-01T12:03:24","date_gmt":"2013-02-01T20:03:24","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10293"},"modified":"2016-02-12T10:34:56","modified_gmt":"2016-02-12T18:34:56","slug":"targeted-attacks-require-better-awareness","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/","title":{"rendered":"Targeted Attacks Require Better Awareness"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10301\" title=\"pay-attention\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention.jpg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>For folks following InfoSec experts on their various social media outlets, especially in the Twittersphere, there\u2019s been a lot of linking to old articles since the New York Times announced that they\u2019d been hacked. (<a href=\"https:\/\/twitter.com\/IntegoSecurity\/status\/297410478660001792\">Yeah, we did it too<\/a>.) While there used to be a lot of breathless marketing hyperbole saying that AV can protect you against all threats that ever were or will be, I think a lot of companies have gotten to the point where they understand they can no longer reasonably say that. (Not that they ever really could reasonably say it, but\u2026you get my drift.)<\/p>\n<p>For as long as I can recall, the real InfoSec experts have been saying a layered defense is necessary, especially if you\u2019re an individual or company likely to be specifically targeted for attack. As much as I dislike that the discussion is necessary at all, I think the plus side of the recent high-profile journalist hackings is it\u2019s leading to a more realistic dialogue (<a href=\"http:\/\/money.cnn.com\/2013\/01\/31\/technology\/security\/antivirus\/index.html\">like in this article<\/a>) about what can and should be done.<\/p>\n<p>Malware is not the only information security problem; it is simply a tool used by criminals. Cybercrime, for the last decade or more, has been about theft of valuable resources. Whether those resources are data or CPU cycles, for direct financial gain or simply for espionage, they\u2019re taking something of ours for their use.<\/p>\n<p>Anti-malware tools block the majority of what\u2019s out there \u2013 these are mostly the malicious tools made to catch regular users like you and me (though we do add those unique, targeted tools too). If you\u2019re someone with extra-valuable information, like journalists, activists, people who work with the government or in the financial sector, you need to use much stronger protection methods. Anti-virus, data-encryption, and firewall are considered by most experts to be the bare minimum for most users at this point. If you\u2019re likely to be directly targeted by motivated cybercriminals, you need to be much more aware of what is happening on your system or your network. You should be keenly aware when there are anomalous activities \u2013 it should not take months or years to know something funky is going on.<\/p>\n<p>As many individuals and organizations have not yet implemented the basics, it\u2019s a tall order to expect people will start using more thorough methods any time soon. But until we all get to that point, we can expect a lot more headlines about incomplete defenses that failed to protect its users.<\/p>\n<p><span style=\"font-size: x-small;\">Tau Zero via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For folks following InfoSec experts on their various social media outlets, especially in the Twittersphere, there\u2019s been a lot of linking to old articles since the New York Times announced that they\u2019d been hacked. (Yeah, we did it too.) While there used to be a lot of breathless marketing hyperbole saying that AV can protect [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10305,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,379],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"For folks following InfoSec experts on their various social media outlets, especially in the Twittersphere, there\u2019s been a lot of linking to old articles\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Targeted Attacks Require Better Awareness - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"For folks following InfoSec experts on their various social media outlets, especially in the Twittersphere, there\u2019s been a lot of linking to old articles\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-01T20:03:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:34:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"325\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg\",\"width\":\"325\",\"height\":\"220\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/\",\"name\":\"Targeted Attacks Require Better Awareness - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#primaryimage\"},\"datePublished\":\"2013-02-01T20:03:24+00:00\",\"dateModified\":\"2016-02-12T18:34:56+00:00\",\"description\":\"For folks following InfoSec experts on their various social media outlets, especially in the Twittersphere, there\\u2019s been a lot of linking to old articles\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Targeted Attacks Require Better Awareness\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Targeted Attacks Require Better Awareness\",\"datePublished\":\"2013-02-01T20:03:24+00:00\",\"dateModified\":\"2016-02-12T18:34:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#webpage\"},\"wordCount\":431,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg\",\"keywords\":[\"Malware\",\"Targeted Attack\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"For folks following InfoSec experts on their various social media outlets, especially in the Twittersphere, there\u2019s been a lot of linking to old articles","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/","og_locale":"en_US","og_type":"article","og_title":"Targeted Attacks Require Better Awareness - The Mac Security Blog","og_description":"For folks following InfoSec experts on their various social media outlets, especially in the Twittersphere, there\u2019s been a lot of linking to old articles","og_url":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-02-01T20:03:24+00:00","article_modified_time":"2016-02-12T18:34:56+00:00","og_image":[{"width":"325","height":"220","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg","width":"325","height":"220"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/","name":"Targeted Attacks Require Better Awareness - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#primaryimage"},"datePublished":"2013-02-01T20:03:24+00:00","dateModified":"2016-02-12T18:34:56+00:00","description":"For folks following InfoSec experts on their various social media outlets, especially in the Twittersphere, there\u2019s been a lot of linking to old articles","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Targeted Attacks Require Better Awareness"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Targeted Attacks Require Better Awareness","datePublished":"2013-02-01T20:03:24+00:00","dateModified":"2016-02-12T18:34:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#webpage"},"wordCount":431,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg","keywords":["Malware","Targeted Attack"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/targeted-attacks-require-better-awareness\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/pay-attention-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2G1","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10293"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10293"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10293\/revisions"}],"predecessor-version":[{"id":10299,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10293\/revisions\/10299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10305"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}