43 Results for

launchagents

Narrow your search

Content Type
Topic
Article

Luxembourg CIRC develops LaunchAgent monitoring tool for OS X

Following my recent outlining of a procedure for monitoring LaunchAgents, the Luxembourg CIRC created an easy-to-use setup utility that handles the procedure for you.

By April 20, 2012

Article

New OS X trojan monitors Web activity to steal BitCoins

Disguised as a legitimate project on GitHub called StealthBit, the malware installs a browser extension to look for and steal BitCoin wallet and account credentials.

By February 10, 2014

Article

Speed up the shutdown process in OS X

A quick adjustment of the timeout values for key processes can greatly speed up otherwise laggy shutdowns in OS X.

By October 14, 2013

Article

New OS X Trojan found and blocked by Apple's XProtect

A new command-and-control Trojan for OS X appears to be associated with the Syrian Electronic Army.

By September 22, 2013

Article

New Tibet malware variant found for OS X

After over a year of no apparent activity, a new variant of the Tibet malware affecting OS X systems has been found.

By September 11, 2013

Article

Banish briefly flashing Adobe update window in OS X

Background updater services showing up may be from duplicate launch agent scripts being used to handle them.

By June 21, 2013

Article

Banish stubborn menu extras in OS X

If you are experiencing problems with a menu extra and can't seem to remove it by standard means, it may have a nonstandard implementation, which will take a couple of steps to root out and uninstall.

By May 9, 2013

Article

New malware variant targets Uyghur Mac users

Yet another malware variant is being sent to Uyghur activists via e-mail spam; however, for updated systems the threat is nonexistent.

By April 25, 2013

Article

How to monitor XProtect updates in OS X

OS X does not provide a way to monitor XProtect updates, but you can set up a custom script to do so.

By March 14, 2013

Article

More Java-based malware plagues the cross-platform runtime

New attacks exploit the Java plug-in as well as simply use Java to run locally when tricking users.

By March 1, 2013