{"id":68695,"date":"2017-07-31T12:54:52","date_gmt":"2017-07-31T19:54:52","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=68695"},"modified":"2017-08-01T12:09:17","modified_gmt":"2017-08-01T19:09:17","slug":"month-in-review-apple-security-in-july-2017","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/","title":{"rendered":"Month in Review: Apple Security in July 2017"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-68728\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/apple-security-news-july-2017.jpg\" alt=\"Month in Review: Apple Security in July 2017\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/apple-security-news-july-2017.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/apple-security-news-july-2017-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/apple-security-news-july-2017-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>July 2017 was another gripping month for Apple security, with new Mac malware surfacing yet again, and Black Hat and DEF CON presentations relevant to the security of Apple devices. Read on for more details.<\/p>\n<h3>New Mac Malware: &#8220;FruitFly&#8221; Spy\u00a0Trojan\u00a0Returns<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-68449\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/osx-fruitfly-malware.png\" alt=\"FruitFly Mac Malware\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/osx-fruitfly-malware.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/osx-fruitfly-malware-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/osx-fruitfly-malware-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Patrick Wardle spoke at the Black Hat USA and DEF CON security conferences last week about a variant of the &#8220;FruitFly&#8221; malware (also called,\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-malware-attacks-and-the-importance-of-layered-protection\/\" target=\"_blank\">ClientCapture<\/a>\u00a0and Quimitchin).<\/p>\n<p>Wardle noted that Apple had not yet updated its XProtect or Malware Removal Tool signatures to detect the newer FruitFly variant.<\/p>\n<p>By registering command and control (C&amp;C) domains previously used by the malware, Wardle was able to receive communication from infected machines and analyze the malware&#8217;s traffic.<\/p>\n<p>You can read our write-up about OSX\/FruitFly.B in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/\" target=\"_blank\">New FruitFly Malware Variant Dragged from the Shadows<\/a>. For further reading, see <a href=\"https:\/\/speakerdeck.com\/patrickwardle\/fruitfly-via-a-custom-c-and-c-server\" target=\"_blank\">Wardle&#8217;s slide deck<\/a> from his talks.<\/p>\n<h3>New Mac Malware: OSX\/Leverage Resurfaces as OSX\/FlashyComposer<\/h3>\n<p>Backdoor malware from 2013 (originally known as OSX\/Leverage.A) has resurfaced in the form of a fake Flash Player update (dubbed OSX\/FlashyComposer.A).<\/p>\n<div id=\"attachment_68656\" style=\"width: 751px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-68656\" loading=\"lazy\" class=\"size-full wp-image-68656\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec.png\" alt=\"GetFlashPlayer\" width=\"741\" height=\"562\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec.png 741w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec-150x114.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec-300x228.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec-657x498.png 657w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><p id=\"caption-attachment-68656\" class=\"wp-caption-text\">The malicious code attempts to download and install a fake Flash update. Image credit: <a href=\"https:\/\/www.volexity.com\/blog\/2017\/07\/24\/real-news-fake-flash-mac-os-x-users-targeted\/\" target=\"_blank\">Volexity<\/a>.<\/p><\/div>\n<p>Although Apple has updated its XProtect bad-download blocker, XProtect won&#8217;t clean up an existing infection. Make sure you&#8217;re running antivirus software on your Mac such as <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> to more proactively prevent and defend against new malware and new variants of existing malware.<\/p>\n<p>For more details, see <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/\" target=\"_blank\">Apple Updates XProtect to Block New Leverage Malware Variant<\/a>.<\/p>\n<h3>Apple Security Updates; Broadpwn Mitigated<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-58801\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/apple-software-security-updates.jpg\" alt=\"Apple Software Security Updates\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/apple-software-security-updates.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/apple-software-security-updates-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/apple-software-security-updates-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On July 19, Apple released security updates for its operating systems, including macOS 10.12.6 and iOS 10.3.3, along with several other apps.<\/p>\n<p>The most notable fix \u2014 available for macOS Sierra, iOS, watchOS, and tvOS, as well as a special Wi-Fi Update for Boot Camp \u2014 resolves a memory corruption issue that could allow a nearby attacker to exploit a flaw in Broadcom wireless hardware to execute arbitrary code on the wireless chip.<\/p>\n<p>That vulnerability, known as Broadpwn, was demonstrated last week by Nitay Artenstein at the Black Hat conference. Artenstein gives a very detailed technical overview of Broadpwn <a href=\"https:\/\/blog.exodusintel.com\/2017\/07\/26\/broadpwn\/\" target=\"_blank\">here<\/a> on his company&#8217;s blog.<\/p>\n<p>Notably, some vulnerabilities including Broadpwn were mitigated for macOS Sierra, but not for El Capitan or Yosemite, even though the older versions of macOS would presumably be affected as well. Intego recommends that users keep their Macs upgraded to the latest version of macOS to get the greatest benefit from Apple&#8217;s latest security features and patches.<\/p>\n<div id=\"attachment_68710\" style=\"width: 840px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-68710\" loading=\"lazy\" class=\"size-full wp-image-68710\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/macos-Sierra-trumps-El-Capitan-and-Yosemite.png\" alt=\"macOS Sierra trumps El Capitan and Yosemite\" width=\"830\" height=\"516\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/macos-Sierra-trumps-El-Capitan-and-Yosemite.png 830w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/macos-Sierra-trumps-El-Capitan-and-Yosemite-150x93.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/macos-Sierra-trumps-El-Capitan-and-Yosemite-300x187.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/macos-Sierra-trumps-El-Capitan-and-Yosemite-768x477.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/macos-Sierra-trumps-El-Capitan-and-Yosemite-657x408.png 657w\" sizes=\"(max-width: 830px) 100vw, 830px\" \/><p id=\"caption-attachment-68710\" class=\"wp-caption-text\">Some macOS vulnerabilities are only patched for the most recent version of macOS, in this case Sierra.<\/p><\/div>\n<p>Several other vulnerabilities, mostly related to the WebKit page-rendering engine, were fixed as well. Safari was updated for macOS Sierra, El Capitan, and Yosemite, and Apple&#8217;s Windows apps (iTunes and iCloud for Windows) also received updates.<\/p>\n<p>For more details on Apple&#8217;s recent security updates, see <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-6-and-more-with-security-fixes\/\" target=\"_blank\">Apple Releases macOS Sierra 10.12.6 and More with Security Fixes<\/a>.<\/p>\n<h3>Other Apple Security News<\/h3>\n<p>July also brought some other interesting (although not necessarily Apple-related) security news:<\/p>\n<ul>\n<li>According to BleepingComputer, the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/devilrobber\/\" target=\"_blank\">DevilRobber\u00a0malware<\/a> (first discovered by Intego in 2011) made a comeback in June as the second most detected Mac malware by a rival anti-virus firm. Read more, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-second-most-popular-mac-malware-is-a-cryptocurrency-miner\/\" target=\"_blank\">here<\/a>.<\/li>\n<li>Black Hat has posted <a href=\"https:\/\/www.blackhat.com\/us-17\/briefings.html\" target=\"_blank\">briefings<\/a>\u00a0with descriptions of sessions and copies of the slideshow presentations from their USA 2017 event.<\/li>\n<li>DEF CON has <a href=\"https:\/\/www.defcon.org\/html\/defcon-25\/dc-25-index.html\" target=\"_blank\">highlights<\/a>\u00a0of their DC25 event.<\/li>\n<li>Wired also has <a href=\"https:\/\/www.wired.com\/story\/best-black-hat-defcon-talks\/\" target=\"_blank\">coverage<\/a>\u00a0of its favorite hacks from both security conferences, including hacks involving guns, safe cracking, carwashes, and &#8220;evil bubbles.&#8221;<\/li>\n<\/ul>\n<div class=\"\">\n<h3>Stay Tuned! Subscribe to The Mac Security Blog<\/h3>\n<p>Be sure to subscribe to The Mac Security Blog to stay informed about Apple security throughout each month.<\/p>\n<p>If you missed Intego&#8217;s previous Apple security news roundups for 2017, you can check them out <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/month-in-security\/\" target=\"_blank\">here<\/a>.<\/p>\n<p><strong><i>Have something to say about this story? Share your comments below!\u00a0<\/i><\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>July 2017 was another gripping month for Apple security, with new Mac malware surfacing yet again, and Black Hat and DEF CON presentations relevant to the security of Apple devices. Read on for more details. New Mac Malware: &#8220;FruitFly&#8221; Spy\u00a0Trojan\u00a0Returns Patrick Wardle spoke at the Black Hat USA and DEF CON security conferences last week [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":68734,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3586,3250,3583,635],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"July 2017 was another gripping month for Apple security, with new Mac malware surfacing yet again, and Black Hat and DEF CON presentations relevant to the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in Review: Apple Security in July 2017 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"July 2017 was another gripping month for Apple security, with new Mac malware surfacing yet again, and Black Hat and DEF CON presentations relevant to the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-31T19:54:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-01T19:09:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg\",\"width\":400,\"height\":260,\"caption\":\"Month in Mac Security - July 2017\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/\",\"name\":\"Month in Review: Apple Security in July 2017 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#primaryimage\"},\"datePublished\":\"2017-07-31T19:54:52+00:00\",\"dateModified\":\"2017-08-01T19:09:17+00:00\",\"description\":\"July 2017 was another gripping month for Apple security, with new Mac malware surfacing yet again, and Black Hat and DEF CON presentations relevant to the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in Review: Apple Security in July 2017\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in Review: Apple Security in July 2017\",\"datePublished\":\"2017-07-31T19:54:52+00:00\",\"dateModified\":\"2017-08-01T19:09:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#webpage\"},\"wordCount\":650,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg\",\"keywords\":[\"Broadpwn\",\"Month in Security\",\"OSX\/FlashyComposer.A\",\"OSX\/Leverage.A\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"July 2017 was another gripping month for Apple security, with new Mac malware surfacing yet again, and Black Hat and DEF CON presentations relevant to the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/","og_locale":"en_US","og_type":"article","og_title":"Month in Review: Apple Security in July 2017 - The Mac Security Blog","og_description":"July 2017 was another gripping month for Apple security, with new Mac malware surfacing yet again, and Black Hat and DEF CON presentations relevant to the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2017-07-31T19:54:52+00:00","article_modified_time":"2017-08-01T19:09:17+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg","width":400,"height":260,"caption":"Month in Mac Security - July 2017"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/","name":"Month in Review: Apple Security in July 2017 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#primaryimage"},"datePublished":"2017-07-31T19:54:52+00:00","dateModified":"2017-08-01T19:09:17+00:00","description":"July 2017 was another gripping month for Apple security, with new Mac malware surfacing yet again, and Black Hat and DEF CON presentations relevant to the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in Review: Apple Security in July 2017"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in Review: Apple Security in July 2017","datePublished":"2017-07-31T19:54:52+00:00","dateModified":"2017-08-01T19:09:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#webpage"},"wordCount":650,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg","keywords":["Broadpwn","Month in Security","OSX\/FlashyComposer.A","OSX\/Leverage.A"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-july-2017\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/month-in-mac-security.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-hRZ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68695"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=68695"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68695\/revisions"}],"predecessor-version":[{"id":68761,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68695\/revisions\/68761"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/68734"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=68695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=68695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=68695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}