{"id":4662,"date":"2012-05-16T14:00:50","date_gmt":"2012-05-16T21:00:50","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4662"},"modified":"2016-02-12T10:19:30","modified_gmt":"2016-02-12T18:19:30","slug":"infographic-mac-flashback-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/","title":{"rendered":"How Flashback Malware Infects Macs &#8211; Infographic"},"content":{"rendered":"<p>The Mac Flashback malware is a threat still actively circulating in the Mac world. During the past month, we&#8217;ve described in great detail <a title=\"What is Flashback?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-flashback\/\" target=\"_blank\">what Flashback is<\/a> capable of doing and why hackers are\u00a0infecting computers with it. We&#8217;ve published thorough, technical articles about the Flashback malware, and explained how you can <a title=\"How Do I Detect and Remove Flashback?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/\" target=\"_blank\">check to see if your Mac is infected<\/a>. As Mac users take heed of the warning that Macs are being infected, it&#8217;s clear that Flashback has raised the visibility of the Mac malware situation.<\/p>\n<p>Even though more people now understand that Macs are not immune to malware, overall security knowledge among Mac users still lags. It&#8217;s understandable, specific details about the Flashback malware are not easy to wrap your head around.\u00a0Intego has put together an infographic that will hopefully help you better understand how Flashback infects Macs.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/mac-flashback-malware-infographic\/\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-4737\" title=\"Mac Flashback Malware - INFOGRAPHIC\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Mac-Flashback-Malware-Infographic.png\" alt=\"\" width=\"560\" height=\"1470\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Mac-Flashback-Malware-Infographic.png 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Mac-Flashback-Malware-Infographic-114x300.png 114w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Mac-Flashback-Malware-Infographic-390x1024.png 390w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Mac-Flashback-Malware-Infographic-100x262.png 100w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">There are new tactics being thought up daily, and there will never be a limit to what cyber-criminals are willing to do to get to your Mac and your private data. By taking the appropriate measures to learn about Mac security, you will find that even though the chance of being infected is always there, staying informed is the best way to keep your computer protected from the bad guys.<\/p>\n<div><span style=\"font-weight: bold; font-size: 14px;\">EMBED THIS IMAGE ON YOUR SITE:<br \/>\n<\/span><br \/>\n<textarea cols=\"80\" rows=\"4\">&lt;a href=&#8221;https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/&#8221;&gt;&lt;img src=&#8221;https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Mac-Flashback-Malware-Infographic.png&#8221; alt=&#8221;Infographic \u2013 Mac Flashback Malware&#8221; \/&gt; &lt;\/a&gt;&lt;br \/&gt;&lt;strong&gt;Source:&lt;\/strong&gt;&lt;a href=&#8221;https:\/\/www.intego.com&#8221; alt=&#8221;Intego&#8221;&gt;Intego&lt;\/a&gt;<\/textarea><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Mac Flashback malware is a threat still actively circulating in the Mac world. During the past month, we&#8217;ve described in great detail what Flashback is capable of doing and why hackers are\u00a0infecting computers with it. We&#8217;ve published thorough, technical articles about the Flashback malware, and explained how you can check to see if your [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":31147,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[153,159,174,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Mac Flashback malware is a threat still actively circulating in the Mac world. During the past month, we&#039;ve described in great detail what Flashback\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Flashback Malware Infects Macs - Infographic - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Mac Flashback malware is a threat still actively circulating in the Mac world. During the past month, we&#039;ve described in great detail what Flashback\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-16T21:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:19:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\",\"name\":\"How Flashback Malware Infects Macs - Infographic - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#primaryimage\"},\"datePublished\":\"2012-05-16T21:00:50+00:00\",\"dateModified\":\"2016-02-12T18:19:30+00:00\",\"description\":\"The Mac Flashback malware is a threat still actively circulating in the Mac world. During the past month, we've described in great detail what Flashback\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Flashback Malware Infects Macs &#8211; Infographic\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"How Flashback Malware Infects Macs &#8211; Infographic\",\"datePublished\":\"2012-05-16T21:00:50+00:00\",\"dateModified\":\"2016-02-12T18:19:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#webpage\"},\"wordCount\":277,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg\",\"keywords\":[\"Flashback\",\"Infographic\",\"Mac\",\"Malware\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Mac Flashback malware is a threat still actively circulating in the Mac world. During the past month, we've described in great detail what Flashback","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/","og_locale":"en_US","og_type":"article","og_title":"How Flashback Malware Infects Macs - Infographic - The Mac Security Blog","og_description":"The Mac Flashback malware is a threat still actively circulating in the Mac world. During the past month, we've described in great detail what Flashback","og_url":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-05-16T21:00:50+00:00","article_modified_time":"2016-02-12T18:19:30+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/","name":"How Flashback Malware Infects Macs - Infographic - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#primaryimage"},"datePublished":"2012-05-16T21:00:50+00:00","dateModified":"2016-02-12T18:19:30+00:00","description":"The Mac Flashback malware is a threat still actively circulating in the Mac world. During the past month, we've described in great detail what Flashback","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Flashback Malware Infects Macs &#8211; Infographic"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"How Flashback Malware Infects Macs &#8211; Infographic","datePublished":"2012-05-16T21:00:50+00:00","dateModified":"2016-02-12T18:19:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#webpage"},"wordCount":277,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg","keywords":["Flashback","Infographic","Mac","Malware"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-400x2601.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1dc","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4662"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4662"}],"version-history":[{"count":45,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4662\/revisions"}],"predecessor-version":[{"id":36784,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4662\/revisions\/36784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/31147"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}