{"id":64279,"date":"2017-03-24T09:57:21","date_gmt":"2017-03-24T16:57:21","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=64279"},"modified":"2017-03-24T09:57:21","modified_gmt":"2017-03-24T16:57:21","slug":"month-in-review-apple-security-in-march-2017","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/","title":{"rendered":"Month in Review: Apple Security in March 2017"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-64393\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/month-in-security-march-2017.jpg\" alt=\"Month in Review: Apple Security in March 2017\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/month-in-security-march-2017.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/month-in-security-march-2017-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/month-in-security-march-2017-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Last month, February, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/\" target=\"_blank\">was a doozy<\/a> with several\u00a0reports of Mac malware in the wild. What notable security events have happened in\u00a0March 2017 that impact\u00a0users of Macs, iPhones, iPads, and other Apple devices? Read on to find out.<\/p>\n<h3>Mac Hackers Get Root at Pwn2Own<\/h3>\n<p><img loading=\"lazy\" class=\"alignright wp-image-64366 size-thumbnail\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-150x150.png\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PWN2OWN-2017.png 1000w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Each year at the CanSecWest security conference, hackers compete for cash prizes and geek cred\u00a0in the Pwn2Own hacking competition. Zero-day vulnerabilities exploited during the contest\u00a0are disclosed to the vendors, so bugs get fixed and end users ultimately benefit from increased security.<\/p>\n<p>On the first day of Pwn2Own, researchers Samuel Gro\u00df and Niklas Baumstark chained together multiple exploits to &#8220;get root&#8221; (obtain full administrator privileges) on a MacBook Pro. They earned style points by displaying &#8220;pwned by niklasb &amp; saelo&#8221; across the Touch Bar.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Awesome pwnage with <a href=\"https:\/\/twitter.com\/_niklasb\">@_niklasb<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/pwn2own?src=hash\">#pwn2own<\/a> \ud83d\ude42 <a href=\"https:\/\/t.co\/Zk0empswbW\">pic.twitter.com\/Zk0empswbW<\/a><\/p>\n<p>\u2014 Samuel Gro\u00df (@5aelo) <a href=\"https:\/\/twitter.com\/5aelo\/status\/842086473490825216\">March 15, 2017<\/a><\/p><\/blockquote>\n<p>(As a fun aside, back in 2010 I <a href=\"https:\/\/archive.org\/details\/MacTechLive70\" target=\"_blank\">interviewed<\/a> four-time Pwn2Own winner Charlie Miller about Mac security and fuzzing after his third-year victory.)<\/p>\n<h3>Apple Denies Alleged iCloud Breach; Refuses Ransom<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-9233\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/hacking-thumb-300x195.jpg\" alt=\"\" width=\"300\" height=\"195\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/hacking-thumb-300x195.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/hacking-thumb-150x97.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/hacking-thumb.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Vice&#8217;s Motherboard blog <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/hackers-we-will-remotely-wipe-iphones-unless-apple-pays-ransom\" target=\"_blank\">reports<\/a> that a group calling itself &#8220;Turkish Crime Family&#8221; has demanded that Apple pay a ransom of $75,000 in cryptocurrency or $100,000 in iTunes gift cards\u00a0to prevent a mass attack on iCloud users.<\/p>\n<p>The extortionists, who threaten to remotely wipe Apple\u00a0devices and reset iCloud accounts if Apple has not paid them by April 7,\u00a0claim to have access to as many as 559 million accounts including some with\u00a0@icloud.com and @me.com domains.<\/p>\n<p>Apple claims that there has not been a breach of iCloud or Apple\u00a0ID systems, and that the extortionists&#8217; list of e-mail addresses and passwords appears to have come from previous attacks on third-party services. Apple told Motherboard:<\/p>\n<blockquote><p>&#8220;We&#8217;re actively monitoring to prevent unauthorized access to user accounts and are working with law enforcement to identify the criminals involved.<br \/>\n&nbsp;<br \/>\n&#8220;To protect against these type of attacks, we always recommend that users always use strong passwords, not use those same passwords across sites and turn on two-factor authentication.&#8221;<\/p><\/blockquote>\n<div id=\"attachment_35047\" style=\"width: 601px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-35047\" loading=\"lazy\" class=\"wp-image-35047 \" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/two-step11.png\" width=\"591\" height=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/two-step11.png 998w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/two-step11-150x101.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/two-step11-300x203.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/two-step11-657x445.png 657w\" sizes=\"(max-width: 591px) 100vw, 591px\" \/><p id=\"caption-attachment-35047\" class=\"wp-caption-text\">Enabling two-step verification for your Apple ID is a good safety precaution.<\/p><\/div>\n<p>We offer the same advice about not reusing passwords across multiple sites. If you may have used your Apple\u00a0ID or iCloud account\u00a0password on\u00a0another site in the past, change your password as a precaution, and be sure\u00a0to use one that&#8217;s\u00a0unique\u00a0and hasn&#8217;t been used elsewhere. And yes,\u00a0definitely\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\" target=\"_blank\">enable two-step authentication<\/a>; adding &#8220;something you have&#8221; to your sign-in process can make it significantly\u00a0more difficult for an attacker to breach your account.<\/p>\n<h3>WikiLeaks&#8217; Vault 7 and DarkMatter Disclosures<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-64354\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Vault7-254x300.png\" alt=\"\" width=\"254\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Vault7-254x300.png 254w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Vault7-127x150.png 127w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Vault7-768x908.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Vault7-866x1024.png 866w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Vault7-657x777.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Vault7.png 1083w\" sizes=\"(max-width: 254px) 100vw, 254px\" \/>WikiLeaks has recently made waves with a series of alleged leaks of U.S. Central Intelligence Agency documents, collectively dubbed &#8220;Vault\u00a07.&#8221; The alleged leaks contain documents, which date from 2012 to 2016 according to security expert Bruce Schneier&#8217;s <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2017\/03\/wikileaks_relea.html\" target=\"_blank\">report<\/a>, that include details of both previously known and new attacks on software and hardware platforms of companies such as Apple, Cisco, Google, Microsoft, and Samsung\u2014some of which were supposedly\u00a0used\u00a0by\u00a0the CIA a decade or longer ago.<\/p>\n<p>Motherboard\u00a0<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/wikileaks-wont-tell-tech-companies-how-to-patch-cia-zero-days-until-its-demands-are-met\" target=\"_blank\">reports<\/a> that WikiLeaks has been in touch with Apple, Google, and Microsoft with an offer to share the details of several vulnerabilities disclosed in Vault\u00a07. According to Motherboard, WikiLeaks would only disclose the details to Apple and other companies if they would promise to patch the vulnerabilities within 90 days.<\/p>\n<p>A Microsoft spokesperson confirmed that Microsoft had been contacted, but Apple and Google have neither commented on Motherboard&#8217;s inquiry nor a follow-up <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/03\/23\/wikileaks-cia-apple-mac-iphone-hacking\/\" target=\"_blank\">inquiry<\/a> from Forbes. However, BuzzFeed reported earlier this month\u00a0that\u00a0Apple had\u00a0stated\u00a0that &#8220;many of the issues leaked [on the first day of Vault\u00a07] were already patched in the latest iOS,&#8221; and that Apple would &#8220;continue to work to rapidly address any identified vulnerabilities.&#8221;<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Here&#8217;s Apple&#8217;s statement on iOS-related stuff in the WikiLeaks CIA data dump. <a href=\"https:\/\/t.co\/QiAWx8ZXpT\">pic.twitter.com\/QiAWx8ZXpT<\/a><\/p>\n<p>\u2014 John Paczkowski (@JohnPaczkowski) <a href=\"https:\/\/twitter.com\/JohnPaczkowski\/status\/839308040775987201\">March 8, 2017<\/a><\/p><\/blockquote>\n<p>Forbes <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/03\/23\/wikileaks-cia-apple-mac-iphone-hacking\/\" target=\"_blank\">reported<\/a>\u00a0this week on a Vault\u00a07 update that WikiLeaks is calling &#8220;DarkMatter,&#8221; which alleges that the CIA has been targeting the iPhone since a year after Apple debuted its groundbreaking smartphone. The CIA was allegedly developing\u00a0rootkit malware called NightSkies in 2008, which Forbes indicates\u00a0would have given\u00a0the CIA complete control over a\u00a0compromised\u00a0iPhone.<\/p>\n<p>There was also allegedly a version of NightSkies in development that targeted Macs, as well as a way to combine multiple attacks to embed persistent rootkit malware into the EFI firmware and operating system.<\/p>\n<div id=\"attachment_36241\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-36241\" loading=\"lazy\" class=\"wp-image-36241 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/thunder-400x260.jpeg\" width=\"400\" height=\"260\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/thunder-400x260.jpeg 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/thunder-400x260-150x97.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/thunder-400x260-300x195.jpeg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><p id=\"caption-attachment-36241\" class=\"wp-caption-text\">One alleged CIA trick from 2012 called &#8220;Sonic Screwdriver&#8221; is similar to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-10-10-2-update-released-fixing-thunderstrike-and-other-security-vulnerabilities\/\" target=\"_blank\">Thunderstrike<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/\" target=\"_blank\">Thunderstrike\u00a02<\/a>, which Apple partially mitigated years ago in 2014 with\u00a0OS X 10.10.2 and in 2015 with 10.10.4.<\/p><\/div>\n<p>As <a href=\"https:\/\/9to5mac.com\/2017\/03\/23\/wikileaks-vault-7-cia-exploits-mac-iphone\/\" target=\"_blank\">noted<\/a> by 9to5Mac, security researcher Will Strafach believes that the vulnerabilities in the DarkMatter release have largely been fixed, and that end users need\u00a0not worry.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">I truly hope it goes without saying, but if not: I have verified that the new release contains nothing of concern. most things are ancient. <a href=\"https:\/\/t.co\/0JSSc0UgF0\">https:\/\/t.co\/0JSSc0UgF0<\/a><\/p>\n<p>\u2014 Will Strafach (@chronic) <a href=\"https:\/\/twitter.com\/chronic\/status\/844914910589005825\">March 23, 2017<\/a><\/p><\/blockquote>\n<h3>Apple Hires Jonathan Zdziarski<\/h3>\n<div id=\"attachment_64348\" style=\"width: 150px\" class=\"wp-caption alignright\"><img aria-describedby=\"caption-attachment-64348\" loading=\"lazy\" class=\"wp-image-64348\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/JonathanZdziarski-233x300.png\" width=\"140\" height=\"180\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/JonathanZdziarski-233x300.png 233w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/JonathanZdziarski-116x150.png 116w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/JonathanZdziarski.png 372w\" sizes=\"(max-width: 140px) 100vw, 140px\" \/><p id=\"caption-attachment-64348\" class=\"wp-caption-text\">Credit: Zdziarski&#8217;s blog<\/p><\/div>\n<p>Earlier this month, leading iOS security expert Jonathan Zdziarski <a href=\"https:\/\/www.zdziarski.com\/blog\/?p=7016\" target=\"_blank\">announced<\/a> that he had accepted a position with Apple&#8217;s Security Engineering and Architecture team. On his acceptance of the position, Zdziarski commented:<\/p>\n<blockquote><p>&#8220;Privacy is sacred; our digital lives can reveal so much about us \u2013 our interests, our deepest thoughts, and even who we love. I am thrilled to be working with such an exceptional group of people who share a passion to protect that.&#8221;<\/p><\/blockquote>\n<p>Although it could certainly benefit Apple and its customers to have Zdziarski as part of Apple&#8217;s security team, AppleInsider <a href=\"http:\/\/appleinsider.com\/articles\/17\/03\/14\/hacker-ios-researcher-jonathan-zdziarski-hired-by-apples-device-security-department\" target=\"_blank\">notes<\/a> that this also likely means that the researcher will reveal little about iOS security on his blog while employed by Apple.<\/p>\n<p>It appears that Zdziarski has deleted his Twitter account.<\/p>\n<h3>Unpatched Vulnerability in Adium IM Client<\/h3>\n<p><img loading=\"lazy\" class=\"wp-image-64351 alignright\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Adium.png\" alt=\"\" width=\"64\" height=\"104\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Adium.png 154w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Adium-92x150.png 92w\" sizes=\"(max-width: 64px) 100vw, 64px\" \/>The Register <a href=\"https:\/\/www.theregister.co.uk\/2017\/03\/22\/adium_lagging_on_library_security_vulnerability\/\" target=\"_blank\">reports<\/a> that Adium, a multi-protocol instant messaging app for macOS, contains an outdated and vulnerable version of the libpurple library.<\/p>\n<p>Users of <a href=\"https:\/\/adium.im\" target=\"_blank\">Adium<\/a> are advised to discontinue using the software until version 1.5.10.3 is released to address the vulnerability.<\/p>\n<h3>ICYMI: RSA Conference 2017 Highlights<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-63244\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/RSAConference-2017-stacked-transparent-300x139-150x70.png\" alt=\"\" width=\"150\" height=\"70\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/RSAConference-2017-stacked-transparent-300x139-150x70.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/RSAConference-2017-stacked-transparent-300x139.png 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>In February&#8217;s update, we mentioned that RSAC 2017 coverage was coming soon. In case you missed it, you can check it out here:<\/p>\n<blockquote data-secret=\"hSpIQFdmEJ\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/\">RSA Conference 2017 Highlights<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/embed\/#?secret=hSpIQFdmEJ\" data-secret=\"hSpIQFdmEJ\" width=\"500\" height=\"282\" title=\"&#8220;RSA Conference 2017 Highlights&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Stay Tuned! Subscribe to The Mac Security Blog<\/h3>\n<p>There&#8217;s more to come.\u00a0Be sure to subscribe to\u00a0<strong>The Mac Security Blog<\/strong>\u00a0to stay informed about Apple security throughout each month.<\/p>\n<p>If you missed Intego&#8217;s other recent Apple security news roundups for 2017, you can check them out here:<\/p>\n<blockquote data-secret=\"OUjteTsHrQ\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/\">Month in Review: Apple Security in February 2017<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/embed\/#?secret=OUjteTsHrQ\" data-secret=\"OUjteTsHrQ\" width=\"500\" height=\"282\" title=\"&#8220;Month in Review: Apple Security in February 2017&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote data-secret=\"gUb2jbKgS8\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-january-2017\/\">Month in Review: Apple Security in January 2017<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-january-2017\/embed\/#?secret=gUb2jbKgS8\" data-secret=\"gUb2jbKgS8\" width=\"500\" height=\"282\" title=\"&#8220;Month in Review: Apple Security in January 2017&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, February, was a doozy with several\u00a0reports of Mac malware in the wild. What notable security events have happened in\u00a0March 2017 that impact\u00a0users of Macs, iPhones, iPads, and other Apple devices? Read on to find out. Mac Hackers Get Root at Pwn2Own Each year at the CanSecWest security conference, hackers compete for cash prizes [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":64399,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3358,3151,3352,174,3250,3355,3298,3349,3346],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last month, February, was a doozy with several\u00a0reports of Mac malware in the wild. What notable security events have happened in\u00a0March 2017 that\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in Review: Apple Security in March 2017 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last month, February, was a doozy with several\u00a0reports of Mac malware in the wild. What notable security events have happened in\u00a0March 2017 that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-24T16:57:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg\",\"width\":400,\"height\":260,\"caption\":\"Mac Security March 2017\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/\",\"name\":\"Month in Review: Apple Security in March 2017 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#primaryimage\"},\"datePublished\":\"2017-03-24T16:57:21+00:00\",\"dateModified\":\"2017-03-24T16:57:21+00:00\",\"description\":\"Last month, February, was a doozy with several\\u00a0reports of Mac malware in the wild. What notable security events have happened in\\u00a0March 2017 that\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in Review: Apple Security in March 2017\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in Review: Apple Security in March 2017\",\"datePublished\":\"2017-03-24T16:57:21+00:00\",\"dateModified\":\"2017-03-24T16:57:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#webpage\"},\"wordCount\":1123,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg\",\"keywords\":[\"Adium\",\"Apple\",\"DarkMatter\",\"Mac\",\"Month in Security\",\"Pwn2Own\",\"RSA Conference\",\"Vault 7\",\"WikiLeaks\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last month, February, was a doozy with several\u00a0reports of Mac malware in the wild. What notable security events have happened in\u00a0March 2017 that","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/","og_locale":"en_US","og_type":"article","og_title":"Month in Review: Apple Security in March 2017 - The Mac Security Blog","og_description":"Last month, February, was a doozy with several\u00a0reports of Mac malware in the wild. What notable security events have happened in\u00a0March 2017 that","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2017-03-24T16:57:21+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg","width":400,"height":260,"caption":"Mac Security March 2017"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/","name":"Month in Review: Apple Security in March 2017 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#primaryimage"},"datePublished":"2017-03-24T16:57:21+00:00","dateModified":"2017-03-24T16:57:21+00:00","description":"Last month, February, was a doozy with several\u00a0reports of Mac malware in the wild. What notable security events have happened in\u00a0March 2017 that","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in Review: Apple Security in March 2017"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in Review: Apple Security in March 2017","datePublished":"2017-03-24T16:57:21+00:00","dateModified":"2017-03-24T16:57:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#webpage"},"wordCount":1123,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg","keywords":["Adium","Apple","DarkMatter","Mac","Month in Security","Pwn2Own","RSA Conference","Vault 7","WikiLeaks"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/mac-security-march-2017.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-gIL","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/64279"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=64279"}],"version-history":[{"count":10,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/64279\/revisions"}],"predecessor-version":[{"id":64369,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/64279\/revisions\/64369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/64399"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=64279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=64279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=64279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}