<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>i3m Blog &#187; mac</title>
	<atom:link href="http://internal3m.com/CMS/Wordpress/tag/mac/feed/" rel="self" type="application/rss+xml" />
	<link>http://internal3m.com/CMS/Wordpress</link>
	<description></description>
	<lastBuildDate>Thu, 21 Apr 2016 14:54:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Find Out if Your Mac Has the Flashback Trojan &#8212; the Fast and Easy Way</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/04/06/find-out-if-your-mac-has-the-flashback-trojan-the-fast-and-easy-way/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/04/06/find-out-if-your-mac-has-the-flashback-trojan-the-fast-and-easy-way/#comments</comments>
		<pubDate>Fri, 06 Apr 2012 18:24:12 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[interface]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[flashback]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[trojan]]></category>
		<category><![CDATA[virus]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=849</guid>
		<description><![CDATA[According to a report Thursday, more than 600,000 Macs could be infected with the nasty Flashback trojan. We’ve already detailed how to check your Mac to see if you’re infected — but that requires some command line code, and we know that not all users are comfortable doing that. Now we’ve gone one step further <a href='http://internal3m.com/CMS/Wordpress/2012/04/06/find-out-if-your-mac-has-the-flashback-trojan-the-fast-and-easy-way/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a href="http://mashable.com/2012/04/05/mac-flashback-trojan-check/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Mashable+%28Mashable%29"><img src='http://internal3m.com/CMS/Wordpress/wp-content/uploads/2012/04/white-macbook-sad-600-275x171.jpg' alt='' /></a></p>
<p>According to a report Thursday, more than 600,000 Macs could be infected with the nasty Flashback trojan.</p>
<p>We’ve already detailed how to check your Mac to see if you’re infected — but that requires some command line code, and we know that not all users are comfortable doing that.</p>
<p>Now we’ve gone one step further and wrapped those commands into two AppleScripts.</p>
<p><strong>READ MORE:</strong></p>
<p>via <a href="http://mashable.com/2012/04/05/mac-flashback-trojan-check/">Find Out if Your Mac Has the Flashback Trojan &#8212; the Fast and Easy Way</a>.</p>
<p>&nbsp;<br />
<hr/>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/04/06/find-out-if-your-mac-has-the-flashback-trojan-the-fast-and-easy-way/feed/</wfw:commentRss>
		<slash:comments>231</slash:comments>
		</item>
		<item>
		<title>Mac trojan poses as PDF to open botnet backdoor</title>
		<link>http://internal3m.com/CMS/Wordpress/2011/09/23/mac-trojan-poses-as-pdf-to-open-botnet-backdoor/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2011/09/23/mac-trojan-poses-as-pdf-to-open-botnet-backdoor/#comments</comments>
		<pubDate>Fri, 23 Sep 2011 18:20:04 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Agency News]]></category>
		<category><![CDATA[back door]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[pdf]]></category>
		<category><![CDATA[trojan]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=544</guid>
		<description><![CDATA[Malware continues to be a minimal threat to most Mac users, but that doesn&#8217;t mean attackers aren&#8217;t constantly trying to come up with new ways to steal information or turn users&#8217; machines into botnet drones. The latter appears to be the case with a new Mac trojan posing as a PDF file, discovered by security <a href='http://internal3m.com/CMS/Wordpress/2011/09/23/mac-trojan-poses-as-pdf-to-open-botnet-backdoor/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p>Malware continues to be a minimal threat to most Mac users, but that doesn&#8217;t mean attackers aren&#8217;t constantly trying to come up with new ways to steal information or turn users&#8217; machines into botnet drones. The latter appears to be the case with a new Mac trojan posing as a PDF file, discovered by security researchers at F-Secure.</p>
<p>via <a href="http://arstechnica.com/apple/news/2011/09/mac-trojan-poses-as-pdf-to-open-botnet-backdoor.ars">Mac trojan poses as PDF to open botnet backdoor</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2011/09/23/mac-trojan-poses-as-pdf-to-open-botnet-backdoor/feed/</wfw:commentRss>
		<slash:comments>83</slash:comments>
		</item>
	</channel>
</rss>
