Apple has released Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 Update 7, which both address a vulnerability in the Java framework that can be exploited by the Flashback malware. Ars Technica reported on Monday that the latest variant of the malware can utilize a Java vulnerability “to hijack Macs even when users don’t enter an administrative password.” According to Apple’s security overview for this update, this can occur when visiting a Web page that is running an untrusted Java applet. (For more about Flashback, see “Beware the Morphing Flashback Malware,” 27 February 2012.) The update is available via Software Update and direct download. (Free, 66.9 MB and 79.7 MB)
Viewing Wi-Fi Details in Snow Leopard
In Snow Leopard, hold down the Option key before clicking the AirPort menu. Doing so reveals additional technical details including which standards, speeds, and frequencies you're using to connect, as well as what's in use by other networks. With the Option key held down and with a network already joined, the AirPort menu reveals seven pieces of information: the PHY Mode, the MAC (Media Access Control) address, the channel and band in use, the security method that's in use, the RSSI (Received Signal Strength Indication) measurement, the transmit rate, and the MCS Index. In Leopard, some, but not all, of these details are revealed by Option-clicking the AirPort menu.
- How to Detect and Protect Against Updated Flashback Malware (05 Apr 12)
- Beware the Morphing Flashback Malware (27 Feb 12)
Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 Update 7
better-looking. Edit your PDFs anywhere. Sign contracts, make
changes, fill forms, and more. All while you’re on the move.
Syncs via iCloud and Dropbox. <http://smle.us/tbpdfpen-ipad>