New malware?

Since a couple of days my iMac (Snow Leopard (10.6.8) would not start up when it is connected to the Internet. Blue
screen appears, and the desktop never appears. If I disconnect the Internet or turn off the modem, it loads
correctly and works as usual. If I turn on the modem while the computer is already on, it freezes or gets extremely
slow - impossible to open any application or turn it off in a normal way. I called my Internet provider, we reset
the modem, and I connected my old PC to test the modem with another computer. It works without problem. After the
reset I tried it with Mac again. The computer was able to start up, very slowly, and I managed to set up the
Internet connection again. But then a message appeared on the screen saying "Please type you computer password in
order for Dropbox to function properly". I clicked "cancel". After that the computer became incredibly slow again,
freezing each time I clicked the mouse.
I would like to run ClamXav or another antivirus software but can not do it because I need to get definitions from
Internet, and the computer becomes not usable as soon as it's connected to the Internet.
Does it look like a malware? The message that appears by itself proposing to enter the password for the computer
seems not to be normal.
I would really appreciate some advice!

Ok.
/private/var/run/StartupItems
- folder doesn't exist.
/Library/StartupItems
- folder "EmagicA26A62mFirmwareLoader" containing items: StartupParameters.plist, Daemonizer,
EmagicA26A62mFirmwareLoader, EmagicA26A62mFW
- folder "Jaksta" containing items: StartupParameters.plist, Jaksta (application "Jaksta" is not installed on my computer)
- folder "Qmaster" (see screenshot):
/System/Library/StartupItems
- folder is empty
/Library/LaunchDaemons
- 5 items, see screenshot:
/System/Library/LaunchDaemons
- 164 items, see screenshots:
Is there anything that should not be there?
Thank you!

Similar Messages

  • New malware disguised as flash installer

    I'm a dummy....fell for the ruse, any ideas on how to get rid of this new malware?  thanks

    I have had some pop ups saying Flash seems to have crashed.Mainly on Youtube videos.
    That's just an error message, not an attempt to get you to download and install software.
    Is my MBP infected?
    If you've downloaded and installed Flash only from Adobe's web site, then no. Ignore any other site's attempt to convince you to install any software they are not the distributors of.
    What signs do I look for. I am 99% certain I have not downloaded anything but 1% of me says maybe!
    Not sure. From what's published on it so far, you wouldn't see any obvious activity, which is the point. Everything they want the Trojan to do happens in the background.
    I just ran software update and nothing new was found.
    Software Update is only for updating Apple software, such as OS X, Final Cut Studio, iLife, etc. It doesn't check for any updates from third party vendors.
    so is the update a remote piece of software?
    Yes, Flash is supplied by Adobe. You can get the real thing here.
    Sorry I am not used to this on my MAC, been a 'user' since 2002 and never worried before.
    There's always something to worry about, no matter what OS you're using. You just have to be vigilant, more than anything else. For now, viruses are still non existent. What few OS X exploits there are, are Trojans. Software that requires you to fall for some supposed value it has and installing it yourself.

  • New malware targets Linux and Mac OS X

    http://www.techspot.com/news/50009-new- … -os-x.html
    pacman -S iptables shorewall
    then to block the malware as root do
    iptables -A INPUT -s 212.7.208.65 -j DROP
    iptables -A OUTPUT -d 212.7.208.65 -j DROP

    Why not just make sure WIFIADAPT isn't sitting in your home directory?
    How exactly is this thing supposed to install and run without the user's knowledge?
    I don't see that shorewall is required to block as you suggest. I could perfectly easily install those rules with just iptables.
    Note, too, that those rules won't block the malware, what they are designed to do as I understand it is to stop the installed malware from  communicating with the server. What I don't understand is why the advice is not to delete the malware. I could understand installing those rules as a precaution in case you later get infected and don't notice. But if as the article says you suspect you are already infected, why not delete the thing if it is really sitting in your home directory like that?

  • Possible new malware

    I received the following email from "Adobe": Adobe reader itself indicates that there are no available updates
    ADOBE PDF READER SOFTWARE UPGRADE NOTIFICATION
    This is to remind that a new version of Adobe Acrobat Reader with enhanced features for viewing, creating, editing, printing and internet-sharing PDF documents has been released.
    To upgrade your application:
    + Go to [url deleted by host]
    + Get your options, download and upgrade.
    Thanks and best regards,
    John Watt
    Adobe Acrobat Reader Support
    Copy rights Adobe 2010 © All rights reserved

    Adobe does not send out update notifications via email.

  • Flash Player is the new malware !

    I had a perfectly functional old Flash 10.0.32 with any security holes covered by my Security.protection
    When I discovered 36 vulnerabilities I decided to "upgrade",
    with no assurance that the latest version did not have at least another 100 vulnerabilities waiting to be discovered and exploited.
    I was horrified that you seem to clickjack me.
    I thought I was clicking for Flash 10.1, but what you gave the Firefox download manager was a GetPlus download manager.
    Why on earth would I want your UNPROVEN download manager, WHICH YOU STATE HAS AN UNPATCHED VULNERABILITY ! !
    I only came here to improve security on a dodgy Adobe product for which I have only rare use.
    IT IS NOT ACCEPTABLE THAT YOU DUMP ANOTHER HACKERS HIGHWAY ONTO MY SYSTEM.
    It is also disgusting that when you gave mme Getplus INSTEAD OF the expected FLASH,
    I had to accept this with no assurance that it would finally deliver Flash -
    For all I knew you could have been downloading a keylogger and identity theft device.
    I also am horrified by your incompetance demonstrated by the new high risk way of doing things :-
    You totally failed to perform the download and upgrade after my many repeated attempts.
    I gave up trying to upgrade.
    Then I found that a site which always worked well now had problems due to my Flash being totally busted by your attempts.
    You bungled everything - you even crippled the old version that had been functional.
    I finally went back to the old way and uninstalled the broken Flash by using
    http://download.macromedia.com/pub/flashplayer/current/uninstall_flash_player.exe.
    I then used the old way of a direct download of Flash 10.1, but again your GetPlus download manager had its evil way.
    I now have Flash plugin 10.1.53, and have removed (so far as I can see) your wretched GetPlus virus downloader.
    My computer seems to have survived all your exploits,
    but I am still steaming over all the needless aggravation Adobe has caused me.
    When I was given this P.C. one of the first major bloat things to be un-installed was Adobe Reader.
    I did not like a few 100 MBytes of bloat to do what other readers achieve with less than 10 MBytes,
    and I especially did not like the fact that by the time Adobe had started up I had forgotten which PDF I needed to read.
    With a little more experience I now realise there are far more important reasons to avoid / replace Adobe products.
    I am now anxiously waiting for HTLM5 to replace Flash.
    Alan

    Thanks for the information,
    but not looking forward to needing it when existing vulnerabilities are identified.
    I saw that GetPlus has a vulnerability when I looked at the Adobe FAQ before I allowed GetPlus to invade me.
    Google gives 8 results for "getplus vulnerability",
    or 43,400 results when omitting the quotes.
    The 43,4000 results are reduced to 89 when I use Advanced search to restrict the search to Adobe.com.
    I forget the precise phrase I saw in the Adobe FAQ which increased my concern over the GetPlus fellowtraveller,
    but it definitely advised that there was an as yet unpatched vulnerability.
    I cannot now find the relevant FAQ.
    I guess my efforts are hampered by my Honours degree in technology instead of a degree in stupidity.
    I am pretty sure that I saw the click opportunity to access the relevant FAQ whilst enroute to actually installing this unwanted downloader,
    and I have no wish to go through that aggravation again - but I assure you the admission of this problem does appear on Adobe.com.
    Alan

  • New Cridex Banking Trojan variant Combines Data Stealer and Email Worm

    Hi Team,
    In an effort to infect large number of people, cybercriminals have developed a new malicious software program that contains functionality to spread itself quickly.
    Geodo, a new version of the infamous
    Cridex (also known as Feodo or Bugat) banking information stealing Trojan works in conjunction with a worm that sends out emails automatically to continue its self-spreading infection method, effectively turning each infected
    Windows system in the botnet for infecting new targets, Seculert warned.
    Ref:-
    http://www.seculert.com/blog/2014/07/geodo-new-cridex-version-combines-data-stealer-and-email-worm.ht
    Here again, Our Securiry team wanted to know whether FEP able to detect this Malware or not.
    Please let us know your update on this.
    Regards
    Sudam Bisi
    Cognizant

    There are many ways which FEP protects you against different kind of malwares, for example using heuristic detection and behavior monitoring , it is possible to detect even unknown malwares. The issue with new malware and cybercriminals is an on-going issue
    and for this reason you have regular updates.
    If you have sample of this threat, you may submit it to Microsoft Malware Protection Center:
    http://cyberdefend.wordpress.com/2012/08/11/submit-sample-to-microsoft-malware-protection-center/
    https://www.microsoft.com/security/portal/submission/submit.aspx

  • What is the best online malware check to use

    What is recommended as the best online malware check on the IMAC? 

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from:
    http://www.clamxav.com/
    The new version for Snow Leopard and Lion is available here:
    http://www.clamxav.com/index.php?page=v2beta
    Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • Does anyone know how to protect rmbp against newst Malware that is going through JAVA?

    I read an article on Appleinsider about a new Malware that is going through java and can affect newer macs. I bought my retina two weeks ago and have to use programs that use java. How can I protect my computer?

    Thanks Kappy! I knew if anyone would know the answer, it would be you. I appreciate it.

  • Malware: CryptoLocker

    The forums is buzzing with this new malware doing the rounds called CrytoLocker.  Encrypting your files after a set time unless your pay a ransom.
    I have tried to find some kind of resolve on the Microsoft sites, google search etc without success.  My Question is simply this:
    Does SCEP detect this malware?  If so what does SCEP ID the malware?  Some entities state that your files can be de-crypted, is this true?  If so what is the process?
    Many thanks
    Avron Lucas
    IT Security Consultant
    Pick n Pay
    Cape Town

    Hi,
    Based on my research, this malware has already been detected by MS. And the malware has a very high level in MS.
    Detailed information for this malware is in the link below:
    http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Trojan%3aWin32%2fCrilock.A
    http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Trojan%3AWin32%2FCrilock.B&ThreatID=-2147283704
    Additionally, it is encrypted by RSA2048. It is difficult to de-encrypt the file if you do not have private key.
    You can also refer to the link:
    http://social.technet.microsoft.com/Forums/en-US/9ebd3aad-2f1a-4309-a274-9355c37c9a6a/deencryption-of-cryptolock-ransomware-encrypted-files?forum=perfmon
    Best Regards
    Quan Gu  
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Malware Redirect???

    My web site is producing a redirect to Adult Friend finder and other **** sites. form inside the site on a secondary image map... the markup language is clean... my web host is telling me it's a "local issue" and that it's Malware on my 10.8.5 OSX. I see this problem on the internet but it's usually ad related and I don'thave ads on my site. The host was able to duplicate the problem so how could it be my machine? They say they recompiled the server and can't duplicate the issue. Is there a new Malware that infects Safari 6 or OSX10.8.5?

    Also they said to check my host file... found it... but what's normal to be in there?
    I have "local host"
    Broadcast host"
    and two more local hosts???
    Thanks

  • Friend with Leopard opened a possible malware attachment

    My friend who uses Leopard on a few year old MacMini got an American Airlines phony email with a supposed confirmation inside an attachment. She should have known better but she opened it, it downloaded something which she then deleted but didn't turn off her computer or modem for an hour.  Looking online, there is a new malware thing going around that looks exactly like this one. I can't tell if it will work on a Mac.  She's now in panic mode, thinking that she should buy some type of malware protective software.  Any suggestions? 

    She may find this User Tip on Viruses, Trojan Detection and Removal, as well as general Internet Security and Privacy, useful:
    https://discussions.apple.com/docs/DOC-2435
    (I have ClamXav set to scan incoming emails, but nothing else.)

  • "Fake scan webpage" malware download attempts ... trouble for me?

    I have never had any problem with malware/virus', etc. However, there is a site that I go to regularly that has been attacked by malware. I discovered this by accidently "almost" allowing a download ... the only way to stop it was to close the browser.
    In theory if this was stopped in its tracks by closing the browser, should I be OK? Friends w/PCs and VISTA and the highest Norton Protection get the following.
    Intrusion Attempt
    http fake scan webpage
    force.com and various IP addresses are listed
    traffic, description
    tcp, 49532
    My PC friends have had immediate responses from Norton which calls this the Highest risk and has blocked it.
    Is it a bad sign that 3 times by accident I stopped this from downloading before figuring the source of it? Could there be any threat to my computer from this simply appearing? I have never seen anything like this before. Should I take the computer in? I'm not MAC saavy.
    Thanks in advance. This is new malware per Symantec but it doesn't mention a MAC being attacked.
    I'm cursed

    Thank you so much for your response. I haven't been able to sleep and am prepared to take my computer in. Am using a laptop right now.
    Symantec indicates this attacks something as high as Windows 2000. However, friends w/Vista received the warnings on their Norton malware blockers, etc. But as noted the program seems strictly directed at Windows.
    I have unchecked "open downloads automatically" as you suggested. I believe I'm alright. I will now check the iMAC quickly, and go back to sleep!
    I will report back after probably taking the iMAC in. Reason I got a MAC was it is so darned secure. What I don't like is unlike the PC I cannot scan or don't see something that says "Intrusion attempt prevented." I have marked this as very helpful.
    I'll simply report back if there is bad news. I stopped this. But it occurred 3 times before I realized the source. A very safe site.
    Again, thank you.

  • Is remedial action needed if you click a link in an unsolicited 'scam-looking' email and the link went 404?

    Mac Mini 2.4GHz Core 2 Duo; 2GB memory; OS X 10.6.8. Incident occurred while using Firefox 35.0.
    The latest/most current discussions I can find are from 2013 or older. Assuming more than a year is plenty of time for "new" malware or even "virus" that can affect Macs to be developed and distributed, I can either assume that "no news is good news"-- 'no new malware/virus possibilities' for Mac, or swallow my pride and ask the question: Is there any malware or other harmful/malicious computer code--read, something that could steal my identity if/when I do my taxes online this year--currently known to be a threat to home non-business Mac computers?
    I ask because I committed the sin of all sins.....I got an unusual email from a vendor from whom I made one purchase (on ebay, a few months ago), asking me to loan "him" a sizable amount of money so he could "pay his hotel and retrieve his passport" while stranded in a foreign country. A very clear and not particularly uncommon scam method.....another flavor of the "grandma I'm in jail in Mexico" scam......and I'm one who constantly wonders how in the world people continue to allow themselves to get scammed (in my head when reading of other people doing it) by clicking on a link OR opening an 'attachment' in an unsolicited email. It wasn't tagged as "spam" by my ISP's very-good spam filters.....it was in my normal inbox; and, it was from a vendor I've done business with.
    There was no attachment, but there was a link; I hovered the cursor over it; the lower left of my monitor showed the link exactly the same as it appeared on the page. I figured, well, it seems to be to the correct URL (knowing the seller's web address outside of ebay because I had visited it before finding he sold the same items on ebay). So, I clicked the link. Without a second thought. There was no other 'contact info' in the body of the email, so I thought the link looks authentic so I'll just go see if there's any information there about the owner being out of the country or ????.
    The link took me to a Google "404" not found page. It was only there that I noticed the URL/link had an added letter; a stupid lack of attention on my part. The site could not be found because the URL was misspelled. I still was blissfully unaware that I violated my own rule (not to click links or attachments in unexpected email from entities I don't know or aren't currently transacting with). So I just closed the window and forgot about it.
    It was only on waking this morning that I realized what I did.....and started worrying that I may have been directed to a phony "404" page that, without any further action on my part needed, might have contained something malicious that could be passed to anyone who connected to the page. I don't even know if that's possible, and I have so far not seen any unusual activity on the computer. But soon I will want to file my tax return....and I worry about the timing of this unusual-possible-scam email and the beginning of "tax time" here in the states?
    So, in summary: Should I be worried that I fell for some new (since 2013) method of unknowingly downloading malicious software to my Mac? If so, what should I do now?

    I don't even know if that's possible, and I have so far not seen any unusual activity on the computer.
    No, it's not even remotely possible. What you encountered was an attempt to scam you, and a pathetic one at that.
    Identity theft in general is a significant threat to any computer (a term encompassing Macs, PCs, iPads, iPhones...) user. However, that threat most commonly arises in the form of "phishing" and you didn't play along with it. The likely reason the email appeared to have come from one of your previous eBay vendors is that his email address was harvested using any number of methods. The email probably didn't even originate with him. eBay is a rich source for obtaining such information.
    eBay has a fairly helpful guide on the subject: http://pages.ebay.com/help/account/recognizing-spoof.html
    To answer your specific questions:
    Is there any malware or other harmful/malicious computer code--read, something that could steal my identity if/when I do my taxes online this year--currently known to be a threat to home non-business Mac computers?
    No.
    So, in summary: Should I be worried that I fell for some new (since 2013) method of unknowingly downloading malicious software to my Mac?
    No — although Mac-targeted adware has arisen since that time and is a rapidly growing annoyance that can make using your Mac practically impossible, it will not directly cause information theft as you have described it concerns you. Furthermore, it requires your participation to install it in the form of an Admin name and password — and it requires deception to convince you to supply those credentials. Learn more about how that happens here: How to install adware.

  • I have never set a firmware password on my macbook pro, but when I hold down option to boot from a different drive, I get a lock, and have no idea what the password is..?

    I have never set a firmware password on mymacbook pro, but when I hold down option to boot from a different drive, I geta lock, and have no idea what the password is, i am the first owner of my mac so its impossible that someone else has set the password, i have only noticed this becuae i made a bootcamp partition and installed windows onto the machine, after the installation... i shut down the comptuer and continued to use os x, days later i tried to boot into the boot camp partition again by holding down the option key on boot, but i got a window asking me for a firmware password that i have no idea of! please help me!
    will

    Hi macbookprowilliam, I have the SAME problem, that grey lock just appeared trolling me. I dunno the password and I wan't to sell this macbook! I need the password. Maybe it's a new malware! I don't even know how to set a firmware password and I am the only user on this computer too! I have a thread about that too: https://discussions.apple.com/thread/3926399?start=0&tstart=0
    So, did you fix it or got around it? Please reply! I am desperate.
    Thank you

  • Shockwave/Flash Player crashes with every browser...Ugh.

    I can't find a solution in this forum although a lot of people seem to be asking this question. Flash crashes constantly and it doesn't matter if I use Chrome, Firefox or IE. It's quite unbearable. I don't have multiple Flash players and if an add-on is causing this, I can't draw a link between it crashing and me disabling them. I've scanned for malware and gotten rid of anything found. No viruses that my virus protection reports. The problem just gets worse. It used to be occasionally, then multiple times a day, now its pretty much anytime I want to use Flash...which seems to be constantly. It freezes my computer then an error message comes up and says Shockwave player has crashed. I have updated shockwave and flash, so I have the most recent versions....any solutions?
    Thanks in advance.

    If your machine had a recent malware infection, you might want to consider backing up your critical files and starting fresh.  It takes time for antivirus and anti-malware packages to discover and push signatures for new viruses, and it's standard practice to deploy new malware to ensure that an attacker maintains their foothold on a compromised machine.
    If it was my personal machine, I would back up any critical data files, wipe the machine and re-install everything from pristine sources.  Not exactly convenient, but you can be reasonably sure that the system is running the software you expect (discounting the possibility of malware that compromises the system BIOS).
    That said, there's not a lot of actionable information here.  I'd recommend uninstalling Flash Player and re-installing fresh.  You actually have three different Flash Players -- there's an ActiveX control for Internet Explorer, the NPAPI plug-in for Firefox and the PPAPI Flash Player for Chrome.  The PPAPI Flash Player for Chrome is totally encapsulated -- it doesn't even share settings.
    SO... malware aside, the next most likely culprit is graphics drivers.  Each of the independent Flash Player installations attempts to use a hardware accelerated feature (like video playback), but the driver crashes.  Typically updating the graphics drivers would resolve this, or you can experiment with disabling hardware acceleration.  How do I disable or enable hardware acceleration? Windows: how do I update the device driver for my video/display adapter?

Maybe you are looking for