Yes, there are verified malware programs out there for both the Macintosh and for Linux. Equally importantly, if you don't at least run an antivirus program, you run the risk of passing a virus on to your Windows friends (assuming any of them actually talk to you). So I've split the Tango into parts - Windows, Linux, the Macintosh, etc. But you get to all of them by that same "Let's Dance! Original release date: January 04, 2018 | Last revised: February 10, 2018 CPU hardware implementations On January 3, 2018, the National Cybersecurity and Communications Integration Center (NCCIC) became aware of a set of security vulnerabilities—known as Meltdown and Spectre—that affect modern computer processors.
These vulnerabilities can be exploited to steal sensitive data present in a computer systems' memory.
Note: NCCIC strongly recommends: Original release date: November 14, 2017 | Last revised: November 22, 2017 Network systems This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). FBI has high confidence that HIDDEN COBRA actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and to further network exploitation.
DHS and FBI are distributing these IP addresses to enable network defense and reduce exposure to North Korean government malicious cyber activity.
CPU hardware implementations are vulnerable to side-channel attacks, referred to as Meltdown and Spectre.