Apple has released Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 Update 7, which both address a vulnerability in the Java framework that can be exploited by the Flashback malware. Ars Technica reported on Monday that the latest variant of the malware can utilize a Java vulnerability “to hijack Macs even when users don’t enter an administrative password.” According to Apple’s security overview for this update, this can occur when visiting a Web page that is running an untrusted Java applet. (For more about Flashback, see “Beware the Morphing Flashback Malware,” 27 February 2012.) The update is available via Software Update and direct download. (Free, 66.9 MB and 79.7 MB)
Option-Click AirPort Menu for Network Details
If you hold down the Option key while clicking the AirPort menu in Mac OS X 10.5 Leopard, you'll see not just the names of nearby Wi-Fi networks, but additional details about the selected network. Details include the MAC address of the network, the channel used by the base station, the signal strength (a negative number; the closer to zero it is, the stronger the signal), and the transmit rate in megabits per second showing actual network throughput. If you hover the cursor over the name of a network to which you're not connected, a little yellow pop-up shows the signal strength and type of encryption.
- How to Detect and Protect Against Updated Flashback Malware (05 Apr 12)
- Beware the Morphing Flashback Malware (27 Feb 12)
Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 Update 7
Automatic’s connected car adapter with iPhone apps on
Automatic’s platform, drivers are able to drive safer and smarter.
TidBITS readers get 20% off all orders at <http://automatic.com/tb>