Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

Microsoft doc details the dos and don’ts of Mac ransomware | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


As enterprise adoption of the Apple platform accelerates, it’s important to note that Macs can and sometimes do get hit by ransomware. So it’s good to stay tuned to security concerns on a platform and application level — and take precautions.

Knowledge is power

With this in mind, extensive insights into Mac ransomware recently published only to be subsequently removed by Microsoft, can help explain these threats. The impact of such attack can be huge – ransomware already costs victims hundreds of billions each year, and no one is immune. 

UK newspaper The Guardian was hit by a ransomware attack in December and continues to suffer. In the US, Emsisoft says 1,981 schools, 290 hospitals, 105 local governments and 44 universities and colleges were hit by ransomware in 2022 alone.

Microsoft’s in-depth report was evidently intended to support adoption of its own security offering, Microsoft Defender, but it provides valuable advice to any company that wants to harden its Mac security.

However, security researchers such as Patrick Wardle noted that Microsoft’s piece seemed close to statements made in his own excellent book, ‘The Art of Mac Malware’, which you can access free here. He also wrote this excellent post detailing some of the history of this scourge.

The anatomy of an attack

The original report does a good job of explaining some of the ways the most prevalent forms of ransomware try to hide themselves from detection by automated analysis systems and manual inspection. It’s useful to understand some of the methods that allow such attacks take place undetected (until it’s too late).

Copyright © 2023 IDG Communications, Inc.



——————————————————–


Click Here For The Original Source.

National Cyber Security

FREE
VIEW