Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/5/2012
07:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BlumAlerts.com Launches Anti-Phishing Software To Protect Macs From Harmful Websites

Also protects from pharming

SAN FRANCISCO, Oct. 5, 2012 /PRNewswire/ -- Macs may be widely immune to malware and viruses, but this does not mean a Mac user can't be duped.

Mac users can be phished. Phishing is when a person visits a website and believing it to be legit and enters personal information. The website is actually a fake and set up specifically to get the user's personal information like credit cards, Social Security number, bank account information and online account details.

"There's an opinion that Mac OS cannot be infected with any spyware or virus since the system always asks for administrator privileges. Well that's true. But phishing is just as big a threat and a Mac doesn't have any way of defending against that," said Max Bugaenko, chief technical officer for BlumAlerts.com.

"So we developed BlumAlerts for Mac OS. This lets a user know if they are about to visit a website that has been linked to phishing."

The software can be downloaded from BlumAlerts.com. The website also has instructions for how to remove the software if the user later decides it is not needed.

"It works with all Mac OS and all Mac browsers," Mr. Bugaenko said. "It's not going to stop a user from visiting a suspicious website, but it will open an alert bubble when the algorithm finds anything suspicious."

Phishing may come from typing in an URL incorrectly or an email. It is far more common in email. A phisher sends out emails telling recipients their account is about to be suspended, terminated or the company needs to verify information. An unsuspecting user opens the email and clicks through to a phishing website.

After entering personal information, the site then usually directs the user to the real website, but by then it's too late. Personal information has been compromised.

BlumAlerts.com offers a lifetime license with a purchase of the full program.

That guarantees the user's software will stay updated by Blum Alerts. The software can also be downloaded and tested for free.

For more information visit BlumAlerts.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...