	{"id":1441,"date":"2010-03-05T15:05:08","date_gmt":"2010-03-05T14:05:08","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1441"},"modified":"2010-03-05T15:05:08","modified_gmt":"2010-03-05T14:05:08","slug":"security-threats-are-more-than-just-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/","title":{"rendered":"Security Threats Are More than Just Malware"},"content":{"rendered":"<p>An InfoWorld article, <a href=\"http:\/\/www.infoworld.com\/d\/security-central\/underrated-computing-threats-you-need-know-about-660\">Underrated computing threats that you need to know about<\/a>, looks at a number of threats to your computer&#8217;s security that don&#8217;t come directly from malware. Traditionally, malware is considered to be viruses, worms, or Trojan horses, all types of malicious code that either duplicates itself (viruses and worms) or inserts code, and often executables, onto your computer (Trojan horses).<\/p>\n<p>But with the rise in attacking techniques, malware writers have been looking at new ways to attack your computer. Some of these methods take advantage of vulnerabilities in software such as Adobe Flash or Acrobat, two programs that have shown a number of weakness in recent times. These are especially dangerous, because you can just visit a web site and get hit.<\/p>\n<blockquote><p>\nOne common manifestation [. . .] comes when the user visits a Web site with a Flash-powered banner ad. No clicking required: as soon as the ad comes up, it delivers its payload. Sometimes it also comes in the form of one of Adobe&#8217;s other products &#8212; for example, an infected .PDF document, which opens spontaneously upon visiting an ad.<\/p><\/blockquote>\n<p>While attacks of this type are not yet targeting Macs, it is highly possible that they will in the future.<\/p>\n<p>Threats also come from Firefox plug-ins, QuickTime flaws, and weaknesses in other applications. There are also risks in following short URLs, the kind used on Twitter posts, because you can&#8217;t see where they lead until you get there. <\/p>\n<p>Finally, DNS poisoning is a way of hijacking routers so their DNS servers take users to bogus web sites; a highly sophisticated form of phishing.<\/p>\n<p>It&#8217;s worth keeping in mind that the threats to your computer are more than just malware, and especially more than simply viruses. Because of these new threats, Intego added a whole range of new defensive features in its <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">VirusBarrier X6<\/a>. From a two-way firewall to web threat protection, VirusBarrier X6 protects Macs from network threats as well as malware. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>An InfoWorld article, Underrated computing threats that you need to know about, looks at a number of threats to your computer&#8217;s security that don&#8217;t come directly from malware. Traditionally, malware is considered to be viruses, worms, or Trojan horses, all types of malicious code that either duplicates itself (viruses and worms) or inserts code, and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"An InfoWorld article, Underrated computing threats that you need to know about, looks at a number of threats to your computer&#039;s security that don&#039;t come\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Threats Are More than Just Malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"An InfoWorld article, Underrated computing threats that you need to know about, looks at a number of threats to your computer&#039;s security that don&#039;t come\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-03-05T14:05:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/\",\"name\":\"Security Threats Are More than Just Malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2010-03-05T14:05:08+00:00\",\"dateModified\":\"2010-03-05T14:05:08+00:00\",\"description\":\"An InfoWorld article, Underrated computing threats that you need to know about, looks at a number of threats to your computer's security that don't come\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Threats Are More than Just Malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Security Threats Are More than Just Malware\",\"datePublished\":\"2010-03-05T14:05:08+00:00\",\"dateModified\":\"2010-03-05T14:05:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#webpage\"},\"wordCount\":330,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"keywords\":[\"Malware\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"An InfoWorld article, Underrated computing threats that you need to know about, looks at a number of threats to your computer's security that don't come","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/","og_locale":"en_US","og_type":"article","og_title":"Security Threats Are More than Just Malware - The Mac Security Blog","og_description":"An InfoWorld article, Underrated computing threats that you need to know about, looks at a number of threats to your computer's security that don't come","og_url":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-03-05T14:05:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/","name":"Security Threats Are More than Just Malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2010-03-05T14:05:08+00:00","dateModified":"2010-03-05T14:05:08+00:00","description":"An InfoWorld article, Underrated computing threats that you need to know about, looks at a number of threats to your computer's security that don't come","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Security Threats Are More than Just Malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Security Threats Are More than Just Malware","datePublished":"2010-03-05T14:05:08+00:00","dateModified":"2010-03-05T14:05:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-threats-are-more-than-just-malware\/#webpage"},"wordCount":330,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"keywords":["Malware"],"articleSection":["Security News"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nf","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1441"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1441"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1441\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}