Apple hit by malware attack
The company said it has found no evidence that the attackers stole any data
IDG News Service - Apple on Tuesday said it was a victim of a malware attack when a small number of systems inside the company were compromised.
The malware attack was tied to a vulnerability in a Java plug-in for browsers, Apple said in a statement sent via email.
"There is no evidence that any data left Apple. We are working closely with law enforcement to find the source of the malware," the statement reads.
Apple isolated the infected systems from its network.
The malware reached Apple computers through a website for software developers. The same malware is also tied to recent malware attacks against Facebook.
Apple is releasing a tool that scans Macs and removes the Java malware. Oracle has also released an update to Java that fixes the vulnerability.
Security concerns prompted Apple to stop adding Java to the operating system by default starting with Mac OS X Lion. However, users can install it independently. If Java is installed, it is automatically disabled after 35 days if not used.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts