{"id":73072,"date":"2017-12-04T09:55:15","date_gmt":"2017-12-04T17:55:15","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=73072"},"modified":"2022-07-06T16:26:46","modified_gmt":"2022-07-06T23:26:46","slug":"month-in-review-apple-security-in-november-2017","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/","title":{"rendered":"Month in review: Apple security in November 2017"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73279\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/apple-security-month-review.jpg\" alt=\"Month in Review: Apple Security November 2017\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/apple-security-month-review.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/apple-security-month-review-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/apple-security-month-review-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>What a month! November brought to light a huge security vulnerability affecting macOS High Sierra, plus Mac malware that masquerades as anti-virus software, and specially crafted masks can fool Face ID (despite Apple&#8217;s claims). Read on for the details!<\/p>\n<h3>I Am Root: Major Root-Access Flaw in High Sierra<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-73057\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/i-am-root-logo.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/i-am-root-logo.jpg 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/i-am-root-logo-150x113.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/i-am-root-logo-300x225.jpg 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>The biggest news of the month is still fresh in our memory. On November 28, the world became aware of a major security vulnerability in macOS High Sierra that could allow an attacker to enable the &#8220;root&#8221; administrator account on a victim&#8217;s Mac.<\/p>\n<p>A bug was introduced in macOS High Sierra 10.13, and remained in 10.13.1, that allowed an attacker\u00a0to invoke a system authentication dialog box, type &#8220;root&#8221; (the name of a powerful UNIX administrator account that&#8217;s disabled by default in macOS), and either enter no password or a password of their choosing, and macOS would enable the root account with the attacker&#8217;s chosen password.<\/p>\n<p>If a system running High Sierra had Screen Sharing enabled, it was even\u00a0possible\u00a0to exploit the vulnerability remotely, without having physical access to\u00a0the\u00a0Mac.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73063\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/iamroot-attack.gif\" alt=\"\" width=\"600\" height=\"435\" \/>The &#8220;I am root&#8221; attack in action. Image credit: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x24.html\" target=\"_blank\" rel=\"noopener\">Patrick Wardle<\/a><\/p>\n<p>Thankfully, Apple responded quickly after the bug\u00a0became widely known. By the next morning, Apple released a <a href=\"https:\/\/support.apple.com\/kb\/DL1942\" target=\"_blank\" rel=\"noopener\">patch<\/a> and pushed it out to all High Sierra users.<\/p>\n<p>There&#8217;s a lot more to this story! For all the juicy details, don&#8217;t miss our extensive coverage:\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/i-am-root-a-retrospective-on-a-severe-mac-vulnerability\/\" target=\"_blank\" rel=\"noopener\">\u201cI Am Root\u201d: A Retrospective on a Severe Mac Vulnerability<\/a>!<\/p>\n<h3>Proton Malware Masquerades as Anti-Virus<\/h3>\n<p>Earlier this year, we reported\u00a0that variants of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/proton\/\" target=\"_blank\" rel=\"noopener\">Proton<\/a> malware were discovered\u00a0on the legitimate download sites of Handbrake and later Elmedia Software. In both cases, the developers&#8217; legitimate apps\u00a0were\u00a0infected with malware and made available directly from the developers&#8217; sites for a period of time without their knowledge.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-72679\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware-300x195.png\" alt=\"Fake Antivirus - Symantec Malware Detector\" width=\"300\" height=\"195\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware-300x195.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware-150x98.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>In November, the\u00a0makers of the Proton malware decided to try a different tactic to infect users.<\/p>\n<p>A blog was discovered\u00a0that purported to be operated by Symantec, an anti-virus company. On this fake\u00a0anti-virus blog was a link to download a supposed &#8220;Symantec Malware Detector,&#8221; which in reality is just a Trojan horse designed to install the Proton malware onto victims&#8217; Macs.<\/p>\n<p>If a\u00a0victim were to download an ran the fake virus scanner, they would be prompted to enter their administrator username and password, at which point the malware would secretly infect the system and then display a fake virus scan (much like other <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/fake-antivirus\/\" target=\"_blank\" rel=\"noopener\">fake antivirus<\/a> software has done in the past).<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-72574\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/2-AdminCredentialsRequest.png\" alt=\"\" width=\"444\" height=\"236\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/2-AdminCredentialsRequest.png 444w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/2-AdminCredentialsRequest-150x80.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/2-AdminCredentialsRequest-300x159.png 300w\" sizes=\"(max-width: 444px) 100vw, 444px\" \/>The fake antivirus\u00a0attempts to gain\u00a0admin privileges.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier<\/a>\u00a0(which is\u00a0<em>legitimate<\/em>\u00a0anti-virus software!) identifies the new malware variant as <strong>OSX\/Proton.D<\/strong>.<\/p>\n<p>For lots more details, check out our article\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/\" target=\"_blank\" rel=\"noopener\">Watch Out! A Fake Antivirus Blog is Distributing Proton Malware<\/a>, and listen to our new\u00a0<a href=\"http:\/\/podcast.intego.com\/7\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast episode<\/a> discussing it (have you <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribed<\/a> yet? ?).<\/p>\n<h3>Face ID Fooled By Hackers\u2026 and a\u00a010-Year-Old Boy?<\/h3>\n<p>Two stories surfaced in November claiming that the iPhone X&#8217;s new Face ID technology had been successfully tricked into unlocking Apple&#8217;s latest smartphone.<\/p>\n<p>One story from <a href=\"https:\/\/www.cnet.com\/news\/iphone-xs-face-id-supposedly-got-hacked-we-have-questions\/\" target=\"_blank\" rel=\"noopener\">CNET<\/a> reports\u00a0that Vietnamese hackers created a specially crafted face mask that allegedly was able to successfully spoof a real person&#8217;s face\u00a0to log into an iPhone\u00a0X. You can watch the mask makers&#8217;\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=i4YQRLQVixM\" target=\"_blank\" rel=\"noopener\">proof-of-concept video<\/a>, which has been viewed 1.2 million times.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73093\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/BKAV-Face-ID-mask.png\" alt=\"\" width=\"750\" height=\"393\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/BKAV-Face-ID-mask.png 750w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/BKAV-Face-ID-mask-150x79.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/BKAV-Face-ID-mask-300x157.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/BKAV-Face-ID-mask-657x344.png 657w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>This\u00a0mask can allegedly bypass Face ID. Image credit: BKAV via <a href=\"https:\/\/www.cnet.com\/news\/iphone-xs-face-id-supposedly-got-hacked-we-have-questions\/\" target=\"_blank\" rel=\"noopener\">CNET<\/a><\/p>\n<p>This is particularly interesting given that when Apple introduced the iPhone\u00a0X, Apple\u00a0executive Phil Schiller took the stage and\u00a0bragged\u00a0that\u00a0Apple had tasked <a href=\"http:\/\/markets.businessinsider.com\/news\/stocks\/apple-says-the-iphone-xs-face-id-system-cant-be-fooled-by-masks-2017-9-1002363504\" target=\"_blank\" rel=\"noopener\">Hollywood mask-making experts<\/a> with trying to fool Face ID, and their efforts were unsuccessful.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-73102\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/BKAV-Face-ID-mask-2-113x150.jpg\" alt=\"\" width=\"113\" height=\"130\" \/>In late November, <a href=\"http:\/\/appleinsider.com\/articles\/17\/11\/27\/apples-face-id-with-attention-detection-fooled-by-200-mask\" target=\"_blank\" rel=\"noopener\">AppleInsider<\/a> reported that the same Vietnamese group repeated the test, developing a second mask that allegedly fools Touch ID. They claim that the new mask cost\u00a0about U.S. $200 to make. Their <a href=\"https:\/\/www.youtube.com\/embed\/rhiSBc061JU\" target=\"_blank\" rel=\"noopener\">second proof-of-concept video<\/a> much more convincingly demonstrates the authenticity of their work; the researcher turns off Face ID and then re-enrolls his face, then shows his face unlocking the iPhone, and then finally shows the mask unlocking the iPhone, all without any camera cuts.<\/p>\n<p>Hot on the heels of the original mask story came a report from <a href=\"https:\/\/www.wired.com\/story\/10-year-old-face-id-unlocks-mothers-iphone-x\/\" target=\"_blank\" rel=\"noopener\">Wired<\/a> that a 10-year-old boy was able to successfully and repeatedly unlock his mother&#8217;s iPhone\u00a0X.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73099\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/10-year-old-unlocks-moms-Face-ID.jpg\" alt=\"\" width=\"634\" height=\"408\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/10-year-old-unlocks-moms-Face-ID.jpg 634w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/10-year-old-unlocks-moms-Face-ID-150x97.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/10-year-old-unlocks-moms-Face-ID-300x193.jpg 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/>Boy&#8217;s face unlocks mom&#8217;s iPhone X. Image: <a href=\"https:\/\/www.youtube.com\/embed\/dUMH6DVYskc\" target=\"_blank\" rel=\"noopener\">Malik\/Sherwani<\/a>\u00a0via <a href=\"https:\/\/www.techworm.net\/2017\/11\/10-year-old-unlock-moms-iphone-x-using-face.html\" target=\"_blank\" rel=\"noopener\">TechWorm<\/a><\/p>\n<p>The idea that a child could gain access to his parent&#8217;s phone, which may contain private information, seemed to really catch people&#8217;s interest; the family&#8217;s 41-second <a href=\"https:\/\/www.youtube.com\/embed\/dUMH6DVYskc\" target=\"_blank\" rel=\"noopener\">YouTube video<\/a> has been viewed more than 2.3 million times.<\/p>\n<p>Apple&#8217;s Schiller\u00a0<a href=\"https:\/\/www.macworld.com\/article\/3225406\/iphone-ipad\/face-id-iphone-x-faq.html\" target=\"_blank\" rel=\"noopener\">admitted<\/a> during the iPhone\u00a0X unveiling keynote that there&#8217;s a higher probability of false matches for people who\u00a0have\u00a0&#8220;a close\u00a0genetic relationship&#8221;\u00a0with the user.<\/p>\n<h3>Dangerous Gadget &#8220;Deals&#8221; Hit Holiday Shopping Season<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-72784\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/black-friday-deals-bad-security-300x168.jpg\" alt=\"Caution! Black Friday \u201cDeals\u201d May Be Bad for Your Security\" width=\"300\" height=\"168\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/black-friday-deals-bad-security-300x168.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/black-friday-deals-bad-security-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/black-friday-deals-bad-security-657x368.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/black-friday-deals-bad-security.jpg 660w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Following the U.S. Thanksgiving holiday\u00a0are\u00a0&#8220;Black Friday&#8221; and &#8220;Cyber Monday,&#8221; two of the biggest shopping days of the year, when retailers have big sales to draw in customers at the theoretical start of the holiday shopping season. Sometimes these promotional sales seem a little too good to be true.<\/p>\n<p>This year at least one popular online retailer has been selling and openly <em>promoting<\/em> <a href=\"https:\/\/www.intego.com\/mac-security-blog\/caution-black-friday-deals-may-be-bad-for-your-security\/\" target=\"_blank\" rel=\"noopener\">ancient iPhones and iPads<\/a> for which Apple is no longer releasing security updates. Using a device online\u00a0when its\u00a0security is\u00a0years out of date is very\u00a0unsafe\u00a0and should be avoided.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-72742\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/dangerous-apple-devices-2.png\" alt=\"\" width=\"1022\" height=\"610\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/dangerous-apple-devices-2.png 1022w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/dangerous-apple-devices-2-150x90.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/dangerous-apple-devices-2-300x179.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/dangerous-apple-devices-2-768x458.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/dangerous-apple-devices-2-657x392.png 657w\" sizes=\"(max-width: 1022px) 100vw, 1022px\" \/><\/p>\n<p style=\"text-align: center;\">Beware of &#8220;bargains&#8221; that may\u00a0come with\u00a0unexpected security risks.<\/p>\n<p>If you have holiday shopping left to do, be sure to check out these articles for tips on how to ensure that the products you&#8217;re buying are secure and how to shop safely:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"PeeYAjrdbq\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/caution-black-friday-deals-may-be-bad-for-your-security\/\">Caution! These Black Friday &#8220;deals&#8221; may be bad for your security<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Caution! These Black Friday &#8220;deals&#8221; may be bad for your security&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/caution-black-friday-deals-may-be-bad-for-your-security\/embed\/#?secret=PeeYAjrdbq\" data-secret=\"PeeYAjrdbq\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Vq0KJEXmML\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/cyber-monday-5-essential-tips-to-stay-safe-shopping-online\/\">7 essential tips to stay safe shopping online on Black Friday and Cyber Monday<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;7 essential tips to stay safe shopping online on Black Friday and Cyber Monday&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/cyber-monday-5-essential-tips-to-stay-safe-shopping-online\/embed\/#?secret=Vq0KJEXmML\" data-secret=\"Vq0KJEXmML\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Other Security News, in Brief<\/h3>\n<p>There were other notable goings-on in the security world in November. Some highlights:<\/p>\n<ul>\n<li><strong>Apple offered to help the FBI break into a Texas shooter&#8217;s iPhone<\/strong> but the FBI allegedly ignored Apple&#8217;s offer, according to <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/11\/09\/apple-fbi-round-two-over-texas-killer-iphone\/\" target=\"_blank\" rel=\"noopener\">Forbes<\/a>. Apple did not offer a backdoor or a way to break or bypass Touch\u00a0ID, but rather\u00a0Apple suggested ways that\u00a0the FBI could obtain information from the phone\u00a0such as applying the deceased killer&#8217;s fingerprints to the Touch ID\u00a0sensor within 48 hours after the man\u00a0had last used\u00a0his iPhone.<\/li>\n<li><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-73090\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-150x150.png\" alt=\"\" width=\"45\" height=\"45\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Safari-iOS-icon.png 1024w\" sizes=\"(max-width: 45px) 100vw, 45px\" \/><strong>Two Safari vulnerabilities in iOS 11.1 through 11.1.2 have yet to be patched.<\/strong>\u00a0<a href=\"http:\/\/www.zdnet.com\/article\/ios-11-hacked-by-security-researchers-day-after-release\/\" target=\"_blank\" rel=\"noopener\">ZDNet<\/a> reports that security researchers successfully compromised Safari in the Tokyo Mobile Pwn2Own contest just a day after the release of iOS 11.1. Since then, Apple has released both iOS 11.1.1 and 11.1.2, but neither one seems to fix any additional vulnerabilities according to <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">Apple<\/a>.<\/li>\n<li><strong><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-73084\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-150x150.png\" alt=\"\" width=\"40\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-1024x1024.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-128x128.png 128w\" sizes=\"(max-width: 40px) 100vw, 40px\" \/>Cryptojacking is becoming more common<\/strong>\u00a0according to <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/11\/drive-by-cryptomining-that-drains-cpus-picks-up-steam-with-aid-of-2500-sites\/\" target=\"_blank\" rel=\"noopener\">Ars Technica<\/a>. The term &#8220;cryptojacking&#8221; refers to the surreptitious mining of cryptocurrency (usually Monero, similar to Bitcoin) in a user&#8217;s browser. Kirk McElhearn and I discussed this topic at length, including how to protect yourself, on the <a href=\"http:\/\/podcast.intego.com\/5\" target=\"_blank\" rel=\"noopener\">November 15 episode<\/a> of the <strong>Intego Mac\u00a0Podcast<\/strong>\u2014be sure to subscribe to make sure you don&#8217;t miss any episodes:<br \/>\n<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone size-thumbnail wp-image-73078\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-150x55.png\" alt=\"Monero\" width=\"109\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-150x55.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-300x110.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes.png 646w\" sizes=\"(max-width: 109px) 100vw, 109px\" \/><\/a><\/li>\n<li><strong><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-73081\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-150x150.png\" alt=\"\" width=\"45\" height=\"45\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon.png 1000w\" sizes=\"(max-width: 45px) 100vw, 45px\" \/>Intego launched a free app, VirusBarrier Scanner<\/strong>, in the Mac App Store. You can\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-launches-virusbarrier-scanner-free-mac-antivirus\/\" target=\"_blank\" rel=\"noopener\">learn more<\/a>\u00a0about the difference between a malware scanning utility\u00a0and full-featured security software, or download\u00a0the scanner now:<br \/>\n<a href=\"https:\/\/itunes.apple.com\/us\/app\/VirusBarrier-Scanner\/id1200445649\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone wp-image-28282 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/Download_on_the_Mac_App_Store.png\" alt=\"Download Mac App Store\" width=\"165\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/Download_on_the_Mac_App_Store.png 165w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/Download_on_the_Mac_App_Store-150x36.png 150w\" sizes=\"(max-width: 165px) 100vw, 165px\" \/><\/a><\/li>\n<li><strong>Apple released two XProtect updates in November.<\/strong>\u00a0(<a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/xprotect\/\" target=\"_blank\" rel=\"noopener\">XProtect<\/a> is Apple&#8217;s bad-download blocker\u00a0that&#8217;s built into macOS.) The first XProtect update was released on November 6 and\u00a0blocks two malicious ad-loaders and a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-august-2017\/\" target=\"_blank\" rel=\"noopener\">Mughthesec<\/a> variant, and the second update was released on November 30 and blocks <strong>OSX.ParticleSmasher.A<\/strong> (Apple&#8217;s name for the\u00a0<strong>OSX\/Proton.D<\/strong>\u00a0fake antivirus malware described above) and <strong>OSX.HiddenLotus.A<\/strong> (which Intego VirusBarrier detects as <strong>OSX\/HiddenCloud<\/strong>).<\/li>\n<\/ul>\n<h3>Stay Tuned! Subscribe to The Mac Security Blog<\/h3>\n<p>Be sure to subscribe to The Mac Security Blog to stay informed about Apple security throughout each month.<\/p>\n<p>If you missed Intego&#8217;s previous Apple security news roundups for 2017, you can check them out\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/month-in-security\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Also,\u00a0be sure to <a href=\"https:\/\/www.youtube.com\/subscription_center?add_user=IntegoVideo\" target=\"_blank\" rel=\"noopener\">subscribe<\/a> to our YouTube channel to get monthly updates in video form, and click on\u00a0YouTube&#8217;s bell\u00a0icon (?) so you&#8217;ll get notified when each new episode is available!<br \/>\n<span style=\"font-size: x-small;\">&#8220;I am root&#8221;\/Groot cartoon image credit: <a href=\"https:\/\/dribbble.com\/shots\/3441716-I-Am-Groot\" target=\"_blank\" rel=\"noopener\">Johnathon Burns<\/a> modified by <a href=\"https:\/\/twitter.com\/Nainterceptor\/status\/935816285811826688\" target=\"_blank\" rel=\"noopener\">Ga\u00ebl\u200f<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What a month! November brought to light a huge security vulnerability affecting macOS High Sierra, plus Mac malware that masquerades as anti-virus software, and specially crafted masks can fool Face ID (despite Apple&#8217;s claims). Read on for the details! I Am Root: Major Root-Access Flaw in High Sierra The biggest news of the month is [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":73285,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[4162,3802,3988,3250,3619,3805,3787],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"What a month! November brought to light a huge security vulnerability affecting macOS High Sierra, plus Mac malware that masquerades as anti-virus\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in review: Apple security in November 2017 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"What a month! November brought to light a huge security vulnerability affecting macOS High Sierra, plus Mac malware that masquerades as anti-virus\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-04T17:55:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-06T23:26:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg\",\"width\":400,\"height\":260,\"caption\":\"Mac Security News November 2017\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/\",\"name\":\"Month in review: Apple security in November 2017 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#primaryimage\"},\"datePublished\":\"2017-12-04T17:55:15+00:00\",\"dateModified\":\"2022-07-06T23:26:46+00:00\",\"description\":\"What a month! November brought to light a huge security vulnerability affecting macOS High Sierra, plus Mac malware that masquerades as anti-virus\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in review: Apple security in November 2017\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in review: Apple security in November 2017\",\"datePublished\":\"2017-12-04T17:55:15+00:00\",\"dateModified\":\"2022-07-06T23:26:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#webpage\"},\"wordCount\":1343,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg\",\"keywords\":[\"Cryptojacking\",\"IAmRoot\",\"Monero\",\"Month in Security\",\"Mughthesec\",\"Rootgate\",\"Symantec Malware Detector\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"What a month! November brought to light a huge security vulnerability affecting macOS High Sierra, plus Mac malware that masquerades as anti-virus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/","og_locale":"en_US","og_type":"article","og_title":"Month in review: Apple security in November 2017 - The Mac Security Blog","og_description":"What a month! November brought to light a huge security vulnerability affecting macOS High Sierra, plus Mac malware that masquerades as anti-virus","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2017-12-04T17:55:15+00:00","article_modified_time":"2022-07-06T23:26:46+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg","width":400,"height":260,"caption":"Mac Security News November 2017"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/","name":"Month in review: Apple security in November 2017 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#primaryimage"},"datePublished":"2017-12-04T17:55:15+00:00","dateModified":"2022-07-06T23:26:46+00:00","description":"What a month! November brought to light a huge security vulnerability affecting macOS High Sierra, plus Mac malware that masquerades as anti-virus","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in review: Apple security in November 2017"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in review: Apple security in November 2017","datePublished":"2017-12-04T17:55:15+00:00","dateModified":"2022-07-06T23:26:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#webpage"},"wordCount":1343,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg","keywords":["Cryptojacking","IAmRoot","Monero","Month in Security","Mughthesec","Rootgate","Symantec Malware Detector"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac-security-news-nov2017.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-j0A","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73072"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=73072"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73072\/revisions"}],"predecessor-version":[{"id":88258,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73072\/revisions\/88258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/73285"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=73072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=73072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=73072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}