Little Flocker enforces low-level access control to files and other sensitive resources like the webcam and microphone With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has decided to acquire Little Flocker, a macOS application that provides behavior-based protection against ransomware and other malicious programs.Little Flocker can be used to enforce strict access controls to a Mac’s files and directories as well as its webcam, microphone and other resources. It’s particularly effective against ransomware, spyware, computer Trojans and other malicious programs that attempt to steal, encrypt or destroy files.F-Secure plans to integrate Little Flocker, which it calls “the most advanced security technology available for Macs,” into its new Xfence technology. Xfence is designed to add behavioral-based protection to its existing endpoint security products for macOS.Little Flocker was developed by iOS forensics expert Jonathan Zdziarski. In March, Zdziarski announced that he had accepted a position with Apple’s Security Engineering and Architecture team, which might explain why he decided to sell his project. While Macs have historically been targeted less than PCs by attackers, that has begun to change in recent years. That’s because MacBooks are preferred by many senior-level company executives, developers and other groups of users that are considered high-value targets for both cybercriminal and cyberespionage groups.Recently leaked documents that allegedly belong to the CIA show that its cyberoperations division has a great interest in MacBooks. The agency has developed low-level firmware implants and espionage software for Apple computers. Cybercriminals are also targeting Macs. Several Windows Trojan programs have been ported to macOS and last year also saw the discovery of the first file-encrypting ransomware for the platform.Little Flocker integrates with macOS at a low level and cannot be easily disabled by malware. It allows users to specify which applications have access to which files or directories. Since it provides real-time protection against unauthorized access to data it can be highly effective at stopping ransomware, which typically attempts to encrypt a large number of files.Head over to Facebook to add your comments. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe