About This Particular Macintosh 12.02

Total Page:16

File Type:pdf, Size:1020Kb

About This Particular Macintosh 12.02 ATPM 12.02 / February 2006 Volume 12, Number 2 About This Particular Macintosh: About the personal computing experience.™ ATPM 12.02 1 Cover Cover Art Copyright © 2006 Phillip Gore1. We need new cover art each month. Write2 to us! The ATPM Staff Publisher/Editor-in-Chief Michael Tsai3 Managing Editor Christopher Turner4 Associate Editor/Reviews Paul Fatula5 Copy Editors Johann Campbell6 Chris Lawson7 Ellyn Ritterskamp8 Brooke Smith9 Vacant Web Editor Lee Bennett10 Webmaster Michael Tsai11 Beta Testers The Staff12 Contributing Editors Eric Blair13 David Blumenstein14 Tom Bridge15 Matthew Glidden16 Ted Goranson17 Andrew Kator18 Robert Paul Leitao19 Wes Meltzer20 David Ozab21 Sylvester Roque22 Charles Ross23 Evan Trent24 1mailto:[email protected] 2mailto:[email protected] 3mailto:[email protected] 4mailto:[email protected] 5mailto:[email protected] 6mailto:[email protected] 7mailto:[email protected] 8mailto:[email protected] 9mailto:[email protected] 10mailto:[email protected] 11mailto:[email protected] 12mailto:[email protected] 13mailto:[email protected] 14mailto:[email protected] 15mailto:[email protected] 16mailto:[email protected] 17mailto:[email protected] 18mailto:[email protected] 19mailto:[email protected] 20mailto:[email protected] 21mailto:[email protected] 22mailto:[email protected] 23mailto:[email protected] 24mailto:[email protected] ATPM 12.02 2 Cover How To Vacant Interviews Vacant Opinion Vacant Reviews Vacant Artwork & Design Graphics Director Vacant Layout and Design Michael Tsai25 Cartoonist Matt Johnson26 Blue Apple Icon Designs Mark Robinson Other Art RD Novo Emeritus Reprints RD Novo, Robert Madill, Belinda Wagner, Ja- Articles, original art, and desktop pictures may not mal Ghandour, Edward Goss, Tom Iovino, Daniel be reproduced without the express permission of the Chvatik, Grant Osborne, Gregory Tetrault, Raena author or artist, unless otherwise noted. You may, Armitage. however, print or distribute copies of this issue of atpm as a whole, provided that it is not modified in Contributors any way. Authors may be contacted through atpm’s editorial staff, or at their e-mail addresses, when pro- Lee Bennett, Tom Bridge, Torben Buchardt, Bill vided. Chenault, Jerry Foster, Ted Goranson, Matt John- son, Miraz Jordan, Chris Lawson, Robert Paul Legal Stuff Leitao, Wes Meltzer, Ellyn Ritterskamp, Steven About This Particular Macintosh may be uploaded Romero, Sylvester Roque, Charles Ross, Mark Ten- to any online area or included on a CD-ROM com- nent, Grover Watson, Angus Wong, Macintosh users pilation, so long as the file remains intact and unal- like you. tered, but all other rights are reserved. All informa- tion contained in this issue is correct to the best of Subscriptions our knowledge. The opinions expressed in atpm are Sign up for free subscriptions using the Web form27. not necessarily those of the entire atpm staff. Prod- uct and company names and logos may be registered trademarks of their respective companies. Thank you Where to Find ATPM for reading this far, and we hope that the rest of the Online and downloadable issues are available at the magazine is more interesting than this. atpm Web Site28. atpm is a product of atpm, Inc. © 1995-2006. All Rights Reserved. ISSN: 1093-2909. ••• Production Tools Thanks for reading atpm. Apache, AppleScript, BBEdit, Cocoa, Docu- tils, DropDMG, FileMaker Pro, GraphicConverter, LATEX, Mesh, make, Mailman, Mojo Mail, MySQL, Perl, Photoshop Elements, PyObjC, Python, rsync, Snapz Pro X, ssh, Subversion, Super Get Info. 25mailto:[email protected] 26http://www.cornstalker.com 27http://www.atpm.com/subscribe/ 28http://www.atpm.com ATPM 12.02 3 Cover ATPM 12.02 4 Cover Sponsors About This Particular Macintosh has been free since 1995, and we intend to keep it that way. Our editors and staff are volunteers with real jobs who believe in the Macintosh way of computing. We don’t make a profit, nor do we plan to. As such, we rely on advertisers and readers like you to help us pay for our Web site and other expenses. ••• This issue of atpm is sponsored by Bare Bones Software1: ••• You can help support atpm by buying from online retailers using our links2. If you’re going to buy from them anyway, why not help us at the same time? We are also accepting inquiries from interested sponsors and advertisers. We have a variety of programs available to tailor to your needs. Please contact us at [email protected] for more information. 1http://www.barebones.com/1903 2http://www.atpm.com/about/support.shtml ATPM 12.02 5 Sponsors Welcome by Robert Paul Leitao, [email protected] Welcome to the February issue of About This Par- the cash to shareholders, essentially liquidating the ticular Macintosh! We start the second month of company and putting it out of business. our twelfth calendar year of publication with the A bit over eight years later, Apple Computer’s Macintosh community in an envious spot: a growing popular products and record earnings contrast with network of users; new Macintosh products in the Dell’s struggles to maintain its earnings per share stores; and increasing opportunities for users to en- growth. A quick look at Dell’s balance sheet indi- joy and exploit new technologies that help us inspire cates that the world’s number one PC maker has had the mind, express, the heart, and sometimes stir the to buy back billions of dollars of its own stock in order soul. to keep its share price at current levels. In short, Ap- January was a spectacular month for the Mac- ple has achieved through organic sales growth (gains intosh community. Were it not for winter’s cold in earnings per share) what Dell has only been able and our desires for the calendar to advance toward to achieve lately by using up its own cash to reduce spring, January was a month many of us wouldn’t the number of its shares outstanding. have minded to let linger. Following the release of Apple’s fourth calendar quarter (first fiscal quarter) financial reports, the rise Intel Core Duo in Apple’s share price subsided. At press time the For years Intel chips seemed everywhere except in- shares were trading in the range of $73 per share. side a Mac. In January, Steve Jobs introduced the As Steve Jobs suggested in his e-mail to staff, we first Macintosh computers with Intel Core Duo chips don’t know what tomorrow brings. But for a brief inside. The new Macs were introduced with a top In- time in January Apple’s bright shine caused a finan- tel executive dressed in a company “bunny” or clean- cial eclipse of Dell on Wall Street. room suit alongside. The clean-room suit was similar to the attire Apple spoofed in the G3 v. Pentium 1st Fiscal Quarter Results advertisement eight years ago. Buoyed by rising iPod sales, Apple Computer re- iMacs with Intel chips have already begun to ship ported record sales and earnings for the three-month and are available in stock configurations at Apple re- period ended December 31, 2005. During the quarter tail stores. The new MacBook Pro (which replaces Apple shipped just over 1.25 million Macs and over the legendary Macintosh PowerBook) will begin to 14 million iPods. This lead to record revenue of $5.75 ship this month. billion and record earnings of $565 million or $.65 per diluted share. Apple v. Dell During the quarterly webcast with analysts, Ap- In January, for a brief moment, Apple surpassed Dell. ple executives offered subdued guidance for this fis- No. Not in market share but in “market cap” or mar- cal quarter. Apple’s performance for the period end- ket capitalization. In other words, Apple Company as ing in March will depend on Intel’s ability to deliver a company had a higher market value than industry sufficient Core Duo chips to meet demand for the volume leader Dell. new iMac and MacBook Pro and will also depend During the first part of January, Apple Com- on whether or not consumers in the market for a new puter’s share price hit an all-time high of $86.40. At Mac will buy iBooks and G5 mini-towers this quarter that lofty share price the total value of the company or wait to buy their Intel-based successors soon after eclipsed Dell’s value, prompting an internally dis- they arrive. tributed e-mail from Steve Jobs to the staff noting The subdued forecast from management caused the event. The event had symbolic significance be- Wall Street analysts to take pause and review their cause in October 1997 Michael Dell responded to a recommendations for the quarter as Apple works reporter’s question about what he would do if he were to complete the chip transition in the Macintosh the head of Apple Computer. Mr. Dell suggested line. Management’s cautious outlook for the quarter he would sell off the company’s assets and distribute ATPM 12.02 6 Welcome is what caused the stock price to retreat from its Pod People: Proud to be a Pod Person January new highs. Traditional radio broadcasts tired old content to its hapless listeners. Find out how to break free of the Rosetta straitjacket with podcasts. While it didn’t take a Rosetta Stone to decipher Apple’s record breaking revenue and earnings report, About This Particular Outliner: Two New it will take Rosetta to dynamically translate instruc- Outliners: Mori and iKnow & Manage tions for PowerPC-based applications on Intel-based This month’s ATPO outliner column examines two Macs. A new icon symbolizing what Apple calls new outliners, Mori and iKnow & Manage. Universal applications will now appear on software boxes. The Universal designation indicates software Segments: Thanks For All the Fish that will run natively on Intel- and PowerPC-based After years of speculation and false starts, the Mac Macs.
Recommended publications
  • Chapter 0X9: Dynamic Monitoring (Tools)
    The Art of Mac Malware: Analysis p. wardle Chapter 0x9: Dynamic Monitoring (Tools) Note: This book is a work in progress. You are encouraged to directly comment on these pages ...suggesting edits, corrections, and/or additional content! To comment, simply highlight any content, then click the icon which appears (to the right on the document’s border). 1 The Art of Mac Malware: Analysis p. wardle Note: As dynamic analysis involves executing the malware (to observe its actions), always ​ perform such analysis in a virtual machine (VM) or on a dedicated malware analysis machine. ...in other words, don’t perform dynamic analysis on your main (base) system! In this chapter, we’ll focus on various dynamic analysis monitoring tools. Specifically, we’ll illustrate how process, file, and network monitors can efficiently provide invaluable insight into the capabilities and functionality of malware specimens. Process Monitoring Malware often spawns or executes child processes. If observed via a process monitor, such processes may quickly provide insight into the behavior and capabilities of the malware. Often such processes are built-in (system) command line utilities that the malware executes in order to (lazily) delegate required actions. For example: ■ A malicious installer might invoke the move (/bin/mv) or copy (/bin/cp) utilities ​ ​ ​ ​ to persistently install the malware. ■ To survey the system, the malware might invoke the process status (/bin/ps) utility ​ ​ to get a list of running processes, or the /usr/bin/whoami utility to determine the ​ ​ current user’s permissions. ■ The results of this survey may then be exfiltrated to a remote command and control server via /usr/bin/curl.
    [Show full text]
  • Report on the 2020 FOSS Contributor Survey
    Report on the 2020 FOSS Contributor Survey The Linux Foundation & The Laboratory for Innovation Science at Harvard Frank Nagle Harvard Business School David A. Wheeler The Linux Foundation Hila Lifshitz-Assaf New York University Haylee Ham Jennifer L. Hoffman Laboratory for Innovation Science at Harvard Acknowledgments This report and the research behind it would not have been possible without the leadership of the Core Infrastructure Initiative’s Advisory Committee, composed of Josh Corman, Steve Lipner, Audris Mockus, Henning Piezunka, and Sam Ransbotham. Frank Nagle would also like to thank his fellow co-directors of the Core Infrastructure Initiative, Jim Zemlin at the Linux Foundation and Karim Lakhani at the Laboratory for Innovation Science at Harvard, for their counsel and direction throughout this project. Gratitude and thanks to Michael Dolan and Kate Stewart at the Linux Foundation for their ongoing commitment to this undertaking. Thank you to James Dana for laying the initial groundwork for this survey. Finally — and perhaps, most importantly — thank you to all the individuals who contribute to FOSS projects. Without their tireless efforts, our core digital infrastructure and the feats enabled by it would not be sustainable. REVISED: This report has been updated since its original release on 8 December 2020. This second version, released on 10 December 2020, corrects errors found in the original text and graphics. Contents Executive Summary 4 Introduction 7 Methodology 9 Overview of Findings 10 Demographics 10 Figure 1: Gender
    [Show full text]
  • AV-TEST Security Report for 2016/2017
    FACTS AND FIGURES SECURITY REPORT The AV-TEST Security Report 2 WINDOWS Security Status 5 macOS Security Status 10 ANDROID Security Status 13 INTERNET THREATS Security Status 16 IoT Security Status 19 2016/17 Test Statistics 22 FACTS AND FIGURES Declining malware statistics It remains positive to note that the declining malware trend in 2016 The AV-TEST provided some relief, at least quantitatively. Thus, compared to 2015, detection systems were required to seek out and defend against 14% fewer Security Report malware samples. In total, this amounted to precisely 11,725,292 fewer newly developed malware programs than in the previous year. It should not be The best news right off the bat: forgotten, however, that the volume of newly developed malware in 2016 still represented the second-highest since the beginning of measurements by Compared to the previous year, the AV-TEST systems. In addition, 2015 saw skyrocketing growth in malware the detection systems of AV-TEST showed programs and in comparison to 2014, practically a doubling of the sample statistics. The overall number of malware programs for all operating systems a slight decline in the development currently exceeds 640 million. of malware programs for the year 2016. Without wanting to belittle the positive trend for 2016, the fact remains that Overall, that is a pleasing trend, however there have been several short-term downward trends since the beginning of by no means any reason to celebrate, measurements in 1984, a total of six times, without seriously influencing the clear, long-term trend – towards more malware. Despite declining numbers, as evidenced by the AV-TEST Institute‘s in 2016, the AV-TEST analysis systems still recorded an average of 350,000 statistics of this year‘s Security Report.
    [Show full text]
  • Publishing Research Software As Open Source on Github
    Publishing Research Software as Open Source on GitHub Table of Contents 1. Introduction 2. Scope & Goals 3. Science & Software i. Reproducibility ii. Software Quality iii. Software Development iv. Software Documentation v. Guide 4. Open Source Basics i. Mindset ii. Arguments against open source... and how to disprove them iii. Success Stories iv. Legal Stuff v. People vi. Guide 5. GitHub i. Basics: Accounts & Repositories ii. Fork & Pull Workflow iii. Social Coding iv. GitHub for Education 6. Software Communities i. Community Building and Openness ii. Marketing and Public Relations iii. Types of Contributors and Tasks iv. Open Source in Your Domain 7. Scientific Publishing of Data and Software 8. Contribute 9. Glossary 2 Publishing Research Software as Open Source on GitHub Introduction How can you publish research software as open source? And do so without too much overhead and actually gain impact by leveraging the open source approach? These questions are answered in this best practice "Publishing Research Software as Open Source on GitHub". It is published by the GLUES project's SDI team. LICENSE This work is licensed under a Creative Commons Attribution 4.0 International License. About this best practice The "source code" of this document is hosted on GitHub and the book was written and published using GitBook. The text is designed to be read in the web view, but PDF and other formats, e.g. for e- readers, area available as well. Version: 0.1 Contributors Thanks to these people for providing contents, giving valuable feedback, reporting errors, ... Daniel Nüst Simon Jirka Ann Hitchcock Want to become a contributor? Check our contribution guidelines.
    [Show full text]
  • SPAULDING, Mccullough & TANSIL LLP 2 90 South E Street, Suite 200 Santa Rosa, CA 95404 3 Telephone: (707) 524-1900 E-Mail: [email protected] 4 Robert W
    Case 3:18-cv-00341 Document 1 Filed 01/16/18 Page 1 of 16 Karin P. Beam, Esq. (Bar No. 112331) 1 SPAULDING, McCULLOUGH & TANSIL LLP 2 90 South E Street, Suite 200 Santa Rosa, CA 95404 3 Telephone: (707) 524-1900 E-Mail: [email protected] 4 Robert W. Payne, Esq. (Bar No. 73901) 5 PAYNE IP LAW 6 111 N. Market Street, Suite 300 San Jose, CA 95113 7 Telephone: (408) 981-4293 E-Mail: [email protected] 8 Attorneys for Plaintiff 9 TWiT, LLC and LEO LAPORTE 10 11 IN THE UNITED STATES DISTRICT COURT 12 FOR THE NORTHERN DISTRICT OF CALIFORNIA 13 14 TWiT, LLC, a Delaware limited liability ) NO. company, LEO LAPORTE, ) 15 ) COMPLAINT FOR BREACH OF Plaintiffs, ) WRITTEN CONTRACT, BREACH OF 16 ) ORAL AGREEMENT, BREACH OF IMPLIED CONTRACT, PROMISSORY 17 vs. ) ) ESTOPPEL, FALSE PROMISE, 18 TWITTER, INC., a Delaware corporation, ) NEGLIGENT MISREPRESENTATION, ) INTENTIONAL INTERFERENCE 19 Defendants. ) WITH PROSPECTIVE ECONOMIC ) ADVANTAGE, INTENTIONAL 20 ) MISREPRESENTATION, 21 ) NEGLIGENT INTERFERENCE WITH ) PROSPECTIVE ECONOMIC 22 ) ADVANTAGE, TRADEMARK ) INFRINGEMENT, UNFAIR 23 ) COMPETITION, AND VIOLATION OF ) COMMON LAW TRADEMARK 24 ) RIGHTS 25 ) ) DEMAND FOR JURY TRIAL 26 27 28 COMPLAINT FOR BREACH OF WRITTEN CONTRACT, BREACH OF ORAL AGREEMENT, BREACH OF IMPLIED CONTRACT, PROMISSORY ESTOPPEL, etc.; DEMAND FOR JURY TRIAL Case 3:18-cv-00341 Document 1 Filed 01/16/18 Page 2 of 16 1 Plaintiffs TWiT, LLC and Leo Laporte allege: 2 JURISDICTION AND VENUE 3 1. This action is brought under the United States Trademark Act of 1946, as amended, 15 4 U.S.C. §§1051 et seq.
    [Show full text]
  • Podcast List
    ACS Chemical Biology Materials Today - Podcasts Africa in Progress Meatball's Meatballs - Juicy and spicy audio meatballs. All Things That Fly Medically Speaking Podcast Annals of Internal Medicine Podcast MedPod101 | Learn Medicine APM: Marketplace Money MicrobeWorld's Meet the Scientist Podcast Are We Alone - where science isn't alien. MIT Press Podcast Asunto del dia en R5 NeuroPod Bandwidth, CBC Radio New England Journal of Medicine Bath University Podcast Directory NIH Podcasts and Videocasts Berkman Center NPR: Planet Money Podcast Beyond the Book NPR Topics: Technology Podcast Bibliotech NW Spanish News - NHK World Radio Japan Books and Ideas Podcast On the Media Brain Science Podcast One Planet Bridges with Africa Out of Their Minds, CBC radio feed Brookings Institute Persiflagers Infectious Disease Puscasts CBS News: Larry Magrid's Tech Report Podnutz - Computer Repair Podcast Chemistry World Podcast PRI: Selected Shorts Podcast Conversations in Medicine PRI's The World: Technology from BBC/PRI/WGBH Conversations Network QuackCast CyberSpeak's Podcast Quirks & Quarks Complete Show from CBC Radio Diffusion Science radio Regenerative Medicine Today - Podcast Digital Planet Science Elements Distillations Science in Action Documentaries, BBC Science Magazine Podcast Duke Office Hours Sciencepodcasters.org Earth Beat Security Now! EconTalk Society for General Microbiology Podcast Engines Of Our Ingenuity Podcast Sound Investing Escape Pod South Asia Wired ESRI Speakers Podcast Spark Plus from CBC Radio FORA.tv Technology Today Stanford's
    [Show full text]
  • A Poisoned Apple: the Analysis of Macos Malware Shlayer By: Minh D
    A Poisoned Apple: The Analysis of macOS Malware Shlayer by: Minh D. Nguyen Abstract Historically, the Microsoft Windows operating system family, which currently runs on more than 70 percent of computers in the world,7 has been the main target for malware. However, with the growing popularity of Apple’s MacBook products, the macOS operating system has become a new platform for attackers to target the general computer users. According to the 2016/2017 Security Report of AV-TEST, the number of malware samples for macOS detected in 2016 has increased by an astonishing 370 percent compared to the same figure in 2015.3 In order to address the rising interest of attackers in the macOS operating system, this project provides an analysis of a newly discovered malware for macOS, Shlayer, to reveal a well- known tactic that attackers can utilize to infect machines running on any operating system, and discusses possible countermeasures for this strategy. I. Introduction macOS is often hailed as a more secure operating system compared to its counterpart Microsoft Windows.2 However, in reality, many attacking techniques targeting Windows machines can also be applied to macOS machines. The analysis of the new Shlayer malware, discovered by researchers of Intego in February 2018,1 will reveal a familiar strategy that attackers often utilize to target victim machines without regards of the operating system. With the worldwide growth of macOS usage, it is important to recognize this attacking method and understand that in many cases, the success of an attack does not depend on the security of the operating system but on the awareness of the user.
    [Show full text]
  • Mac Security Report 2020
    Independent Tests of Anti-Virus Software Mac Security Test & Review TEST PERIOD : JUNE 2020 LANGUAGE : ENGLISH LAST REVISION : 26TH JUNE 2020 WWW.AV-COMPARATIVES.ORG Mac Security Report – June 2020 www.av-comparatives.org Contents MACS AND SECURITY SOFTWARE 3 SECURITY SOFTWARE FOR MACOS CATALINA 5 MALWARE PROTECTION TEST 6 RESULTS 7 SUMMARY 8 AV-COMPARATIVES’ MAC CERTIFICATION REQUIREMENTS 9 REVIEW FORMAT 10 AVAST SECURITY FOR MAC 11 AVG INTERNET SECURITY FOR MAC 14 AVIRA ANTIVIRUS PRO FOR MAC 18 BITDEFENDER ANTIVIRUS FOR MAC 21 CROWDSTRIKE FALCON PREVENT FOR MAC 24 FIREEYE ENDPOINT SECURITY FOR MACOS 27 KASPERSKY INTERNET SECURITY FOR MAC 29 POCKETBITS BITMEDIC PRO ANTIVIRUS 32 TREND MICRO ANTIVIRUS FOR MAC 36 APPENDIX – FEATURE LIST 39 COPYRIGHT AND DISCLAIMER 40 2 Mac Security Report – June 2020 www.av-comparatives.org Macs and Security Software It is an often-heard view that macOS computers don’t need antivirus protection. Whilst it is certainly true that the population of macOS malware is very tiny compared to that for Windows and Android, there have been instances of macOS malware 1 getting into the wild. Moreover, Apple Mac security needs to be considered in the wider context of other types of attacks 2. In addition, it should be noted that Apple themselves ship some anti-malware capabilities within macOS. Firstly, there is “Gatekeeper”, which warns when apps without a digital signature are run. Then there is “XProtect”, which checks files against known-malware signatures. Finally, Apple provide the MRT (Malware Removal Tool). Gatekeeper and MRT are essentially invisible to users and have no direct user interface for the user.
    [Show full text]
  • Deafweekly June 15, 2005 Deafweekly
    Deafweekly June 15, 2005 deafweekly June 15, 2005 Vol. 1 No. 35 Editor: Tom Willard Deafweekly is an independent news report for the deaf and hard-of-hearing community. It is mailed to subscribers every Wednesday morning and available to read at www.deafweekly.com. For information, contact [email protected]. To subscribe, please visit www.deafweekly.com. After you sign up, you will receive a confirmation email. Be sure to click on the link in this email to activate your subscription. If you've signed up but haven't received anything, please send a note to [email protected] so the problem can be resolved. The contents of Deafweekly are Copyright 2005. Any unauthorized use, including reprinting of news, is prohibited. Readership: approximately 4,500 including subscribers and website readers. Please support our advertisers; they make it possible for you to receive this newsletter at no charge. For advertising information, see www.deafweekly.com/advertise.htm. +++++++++++++++++++++++++++++ NATIONAL +++++++++++++++++++++++++++++ NTID NOTES 40TH ANNIVERSARY OF LBJ BILL SIGNING Yesterday was the 40th anniversary of the day President Lyndon Baines Johnson signed a bill to create the National Technical Institute for the Deaf, the Rochester (N.Y.) Democrat and Chronicle reported. To mark the occasion, NTID dedicated a garden in honor of the school's first director, Robert Frisina, who served from 1967 to 1979. NTID is one of eight colleges of the Rochester Institute of Technology, and some 5,500 students have graduated since the school's first class of 70 students arrived on campus in 1968. Today, about 1,200 students attend NTID or receive support services while attending RIT's other colleges, and another 100 are enrolled in the interpreter training program.
    [Show full text]
  • Internet Security Report QUARTER 1, 2019 Contents
    Internet Security Report QUARTER 1, 2019 Contents 03 Introduction Contents 04 Executive Summary The Firebox Feed™ provides 05 Firebox Feed Statistics quantifiable data and trends 07 Malware Trends about hackers’ latest attacks, and 08 Overall Malware Trends understanding these trends can help 09 Most Widespread Malware us improve our defenses. 09 New Malware Hits 14 Quarter-Over-Quarter Malware Analysis 15 Year-Over-Year Malware Analysis 16 Geographic Threats by Region 17 Zero Day vs Known Malware 18 Network Attack Trends 20 Top 10 Network Attacks Review 21 Top 5 Most Widespread Network Attacks 22 Total Network Attack Hits by Region 23 DNS Analysis 24 Firebox Feed: Defense Learnings 25 Top Security Incidents: Ethereum Classic 51% Attack 27 About Cryptocurrency 27 How Transactions Are Added A B 28 Enter Ethereum Reset A B 28 51% Attacks Reset 29 Are Major Cryptocurrencies Vulnerable? 30 What Is the Fix? 31 Conclusion & Defense Highlights 35 About WatchGuard Internet Security Report: Q1 2019 • 2 Introduction The report for Introduction Q1 2019 includes: Q1’s Firebox Feed results. As always, the WatchGuard Threat No pilot worth his or her salt would take off in a plane Lab analyzes threat intelligence 06 from over 42,000 Fireboxes. The without first checking the weather. Why? Weather is the feed includes data about the second most common cause of plane crashes, the first top malware, both by volume being human error. By checking the weather, humans and networks affected. It also understand what they are getting into and receive a includes network attack statistics situational awareness of their current condition.
    [Show full text]
  • Tracking Content and Predicting Behavior
    UvA-DARE (Digital Academic Repository) Mining social media: tracking content and predicting behavior Tsagkias, M. Publication date 2012 Document Version Final published version Link to publication Citation for published version (APA): Tsagkias, M. (2012). Mining social media: tracking content and predicting behavior. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:02 Oct 2021 Mining Social Media: Tracking Content and Predicting Behavior Manos Tsagkias Mining Social Media: Tracking Content and Predicting Behavior ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof.dr. D.C. van den Boom ten overstaan van een door het college voor promoties ingestelde commissie, in het openbaar te verdedigen in de Agnietenkapel op woensdag 5 december 2012, te 14:00 uur door Manos Tsagkias geboren te Athene, Griekenland Promotiecommissie Promotor: Prof.
    [Show full text]
  • Pandemic Chaos Unleashes Malware Disaster
    Pandemic Chaos Unleashes Malware Disaster 2020 cyber THREAT LANDSCAPE Report 1 table of CONTENts Executive Summary 3 Foreword 3 Top Takeaways 4 The Top Malware Trends of 2020 5 Top 5: Malware Families 6 Top 5: Ransomware Families 7 Top 5: Banking Trojan Families 8 Malware Trends by OS: Documents 9 Malware Trends by OS: Mac 11 Malware Trends by OS: Android 12 Malware Trends by Campaign: Emotet 13 Malware Trends by Campaign: Ransomware 15 Malware Trends by Campaign: Financial Trojans 18 Malware Trends by Campaign: PowerShell 20 Year’s Most Interesting Discoveries 21 Cyber Insights: Effect of COVID-19 on Cybersecurity 23 Cyber Insights: SolarWinds Attack 24 Cyber Insights: Risks Present at US Elections 25 Cyber Insights: Adversarial Machine Learning 26 Cyber Insights: A Look Back at Our 2020 Predictions 27 Cyber Insights: 2021 Predictions 28 Cyber Insights: The Cost of an Attack in 2020 30 About Deep Instinct 31 2 Executive Summary Virtual reality always appears to mirror the reality that’s in many phishing campaigns. The dropper documents on the ground, and unfortunately, the turbulent year of accompanying these phishing campaigns were used to 2020 was no exception. From 2019 to 2020 there was a distribute secondary malware samples, such as worms, distinct rise in the amount of malware in the wild, which spyware and ransomware. Their objective was often the is all the more visible when analyzing the progression theft of Personally Identifiable Information (PII), and from month to month. This rise was seen across their efforts proved to be successful, potentially even all different malware types; from ransomware and beyond the expectations of hackers themselves.
    [Show full text]