{"id":13609,"date":"2013-04-23T12:28:24","date_gmt":"2013-04-23T19:28:24","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=13609"},"modified":"2013-04-26T07:45:44","modified_gmt":"2013-04-26T14:45:44","slug":"your-information-likes-to-hide-on-your-computer","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/","title":{"rendered":"Your Information Likes to Hide on Your Computer"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13921\" alt=\"find-blog-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-blog-header.jpg\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-blog-header-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-blog-header-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>As you might imagine, researching malware might give you a unique perspective on computers. One of the things we do in the course of malware analysis is to set up sacrificial \u201cgoat\u201d systems that we can let get all crudded up in a safe and secure way. (Well, safe and secure for anything outside that goat machine, anyway.) We create different \u201cimages,\u201d which will vary here and there (e.g., one image for macro viruses, another for different types of infection vectors, different operating systems, etc).<\/p>\n<p>To ensure the best possibility of the malware working, you want it to look and act reasonably like a real person\u2019s machine, so you populate it with fake information that a malware creator might want to grab, like email addresses and passwords. For safety\u2019s sake, you want to make sure any information on the system is just what you have put there \u2013 no email addresses or account information from Readme files or software documentation in browser history or any temporary files.<\/p>\n<p>Once we got everything set up on a new goat machine, the last step before saving a snapshot was to go through and purge wayward non-test contact information from that system. It beggars belief the places where this information resides, even on a clean install (an almost-untouched system). On a system that has been used for a while to create and swap files, to send and receive emails, and to make online purchases, there is a whole lot more interesting information to be found.<\/p>\n<p>Attackers, being in it to make a buck, know this too. That was why we had to be so thorough in cleaning our goat systems before we could use them for analysis. Malware authors would find info in the darndest places, not stopping at just looking through documents or emails, or what was actively being typed. So it\u2019s useful to be aware of what information is on your system so you can lock it up if need be.<\/p>\n<p>Doing this manually is kind of a royal pain, which is why it\u2019s cool that there are now products (like <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium#\/identity-scrubber\">Identity Scrubber<\/a>) that do the heavy lifting for you. It can sift through your machine for whatever information you want to be aware of, and then you can choose to scrub that data away or lock it in the vault so it\u2019s not lying around in the open. You can repeat the process periodically to keep things tidy.<\/p>\n<p>This technology on its own won\u2019t protect you from bad guys skulking around the Internet, but it can go a long way to making your machine a less tempting target. Especially if you pair it with regular security software like <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium#\/virusbarrier-2013\">anti-virus<\/a> and a <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium#\/net-barrier-2013\">firewall<\/a>, it can make your data that much harder to get than the next guy\u2019s.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you might imagine, researching malware might give you a unique perspective on computers. One of the things we do in the course of malware analysis is to set up sacrificial \u201cgoat\u201d systems that we can let get all crudded up in a safe and secure way. (Well, safe and secure for anything outside that [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":13923,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[231],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As you might imagine, researching malware might give you a unique perspective on computers. One of the things we do in the course of malware analysis is\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Information Likes to Hide on Your Computer - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As you might imagine, researching malware might give you a unique perspective on computers. One of the things we do in the course of malware analysis is\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-23T19:28:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-04-26T14:45:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/\",\"name\":\"Your Information Likes to Hide on Your Computer - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#primaryimage\"},\"datePublished\":\"2013-04-23T19:28:24+00:00\",\"dateModified\":\"2013-04-26T14:45:44+00:00\",\"description\":\"As you might imagine, researching malware might give you a unique perspective on computers. One of the things we do in the course of malware analysis is\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Information Likes to Hide on Your Computer\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Your Information Likes to Hide on Your Computer\",\"datePublished\":\"2013-04-23T19:28:24+00:00\",\"dateModified\":\"2013-04-26T14:45:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#webpage\"},\"wordCount\":480,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg\",\"keywords\":[\"Information Security\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As you might imagine, researching malware might give you a unique perspective on computers. One of the things we do in the course of malware analysis is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/","og_locale":"en_US","og_type":"article","og_title":"Your Information Likes to Hide on Your Computer - The Mac Security Blog","og_description":"As you might imagine, researching malware might give you a unique perspective on computers. One of the things we do in the course of malware analysis is","og_url":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-04-23T19:28:24+00:00","article_modified_time":"2013-04-26T14:45:44+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/","name":"Your Information Likes to Hide on Your Computer - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#primaryimage"},"datePublished":"2013-04-23T19:28:24+00:00","dateModified":"2013-04-26T14:45:44+00:00","description":"As you might imagine, researching malware might give you a unique perspective on computers. One of the things we do in the course of malware analysis is","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Your Information Likes to Hide on Your Computer"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Your Information Likes to Hide on Your Computer","datePublished":"2013-04-23T19:28:24+00:00","dateModified":"2013-04-26T14:45:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#webpage"},"wordCount":480,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg","keywords":["Information Security"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/find-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3xv","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13609"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=13609"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13609\/revisions"}],"predecessor-version":[{"id":14019,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13609\/revisions\/14019"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/13923"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=13609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=13609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=13609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}