With all this talk about the Flashback Trojan, thought I might ask a few things. My browser: Firefox (with the NoScript extension) OSX: Snow Leopard. Up until now, IF there was an Adobe Flash Player update, I would simply visit youtube.com and receive a pop-up which would look like the REAL version (If I recall correctly), as explained here: and here: In Firefox I would then open my 'Add-ons Manager' tab go to 'Plug-Ins' and compare the 'Shockwave Flash' version with the one shown in IF there was an update indeed (newer version available), I would proceed with the pop-up I got from youtube.com: installing, providing my admin password and so on. In recent times I have gotten the pop-up WITHOUT visiting youtube, but again, the update pop-up looks legit, so most likely they simply added an automatic check upon loading my browser. Like I mentioned I have the NoScript extension, so I would have to enable all scripts first before anything malicious can run, I think. UPDATE: Now in fact I just got the pop-up again (suggesting to update from version: 11.2.202.228 to version 11.2.202.233) and know it's best to get the update directly from.
So how do I go about this now?: IF I get the pop-up, do I just click on 'REMIND ME LATER' or close it, go to the official Adobe Flash Player page, download their OFFICIAL installer, and then just run it? Or do I have to uninstall my flash player each time there's an update before running the OFFICIAL installer? Is there any danger on clicking 'REMIND ME LATER' or closing it if the pop-up isn't legit? - Under 'System Preferences' Other Flash Player, do I have to change any settings? -I have already made sure I have the latest 'Software Update'.
Adobe Flash Player for Mac lets you access Flash content in Web sites when using browsers like OS X's Safari. The plug-in integrates seamlessly and through a.
So in a sense, IF I had Flashback, that would automatically protect AND 'cure' my system? -I checked my downloads folder: Only flash related installer I have is: 'installflashplayerosxintel.dmg (which I obviously don't want to open), but I assume this is a legit installer from the time my Mac was new and the trojan wasn't around yet. So: - Is it safe to assume I do NOT have the trojan? - How can I tell if I have it? - The ONLY way to get it is by visiting a malicious website?
- Is this the trojan that spreads through a Chinese PDF? I already tested for the other Flashback trojan variation (the one that spreads through a JAVA exploit), with those terminal commands, and it seems I'm clean. Thanks for all your help! Click to expand.If you have run Software Update on Snow Leopard or Lion, it's save to assume you're not infected. Macs are not immune to malware, but no true viruses exist in the wild that can run on Mac OS X, and there never have been any since it was released over 10 years ago.
The only malware in the wild that can affect Mac OS X is a handful of trojans, which can be easily avoided by practicing safe computing (see below). Also, Mac OS X Snow Leopard and Lion have built in, further reducing the need for 3rd party antivirus apps. .
![Flash Flash](/uploads/1/2/5/6/125617194/199590030.png)
Make sure your built-in Mac firewall is enabled in System Preferences Security Firewall. Uncheck 'Open 'safe' files after downloading' in Safari Preferences General. Disable Java in your browser. (For Safari users, uncheck 'Enable Java' in Safari Preferences Security.) This will protect you from malware that exploits Java in your browser, including the recent. Leave this unchecked until you visit a trusted site that requires Java, then re-enable only for the duration of your visit to that site. (This is not to be confused with JavaScript, which you should leave enabled.).
Change your DNS servers to OpenDNS servers by reading. Be careful to only install software from trusted, reputable sites. Never install pirated software.
If you're not sure about an app, ask in this forum before installing. Never let someone else have access to install anything on your Mac. Don't open files that you receive from unknown or untrusted sources. For added security, make sure all network, email, financial and other important passwords are long and complex, including upper and lower case letters, numbers and special characters. Always keep your Mac and application software updated.
Use Software Update for your Mac software. For other software, it's safer to get updates from the developer's site or from the menu item 'Check for updates', rather than installing from any notification window that pops up while you're surfing the web. That's all you need to do to keep your Mac completely free of any Mac OS X malware that has ever been released into the wild. You don't need any 3rd party software to keep your Mac secure.