You may have heard about a recent malware attack, called Flashback, that is affecting a good number of Mac users. Apple was late in distributing a patch to fix this issue, but they have finally done so.
I'm urging my customers to make sure they have downloaded and installed the latest Apple Security Updates that include the latest Java patches that fix the vulnerability the malware is currently using.
To do this, connect your Mac to the internet, pull down from Apple menu in the menubar and select Software Update.
To be sure your machine isn't already infected, I'd like you to download and run this simple script interface that looks for evidence of the infection. If it indicates a problem please let me know and I can stop out and take care of the problem.
More info from the Arstechnica article:
Developers behind the Flashback trojan for the Mac have updated it to exploit a vulnerability in the Java software framework(.)
Flashback.K, as the latest variant is called, is able to hijack Macs even when users don't enter an administrative password. Instead, it does this by exploiting a critical Java vulnerability classified as CVE-2012-0507, F-Secure researchers wrote in a blog post.
Attacks that exploit CVE-2012-0507 recently went mainstream when they were added to automated exploit kits such as Blackhole. Once it infects a Mac, Flashback changes the contents of some of the webpages it displays.