How to protect your Mac from malware?
Malware is a malicious software designed to gain unauthorised access into your Mac and cause damage to it. This is done to benefit the hackers in some way – whetherRead More →
Malware is a malicious software designed to gain unauthorised access into your Mac and cause damage to it. This is done to benefit the hackers in some way – whetherRead More →
This week, a young cybersecurity researcher demonstrated how to hack the webcams of Mac devices to leave the devices completely open to other attack variants. Ryan Pickren submitted his reportRead More →
Cybersecurity specialists report the detection of a critical vulnerability in some VMware products, including Cloud Foundation, Fusion and Workstation. According to the report, the successful exploitation of these flaws wouldRead More →
During 2019, network security specialists from Kaspersky issued reports on thousands of infections of Shlayer, a new Trojan family, managing to prevent attacks on one in ten Mac devices. AlthoughRead More →
The malware has been spread through a cryptocurrency exchange hack Lazarus Group, the North Korean hacker group responsible for the attack on Sony films a few years ago, has launched its firstRead More →
During the last hours, ESET researchers noticed that Eltima, the makers of the Elmedia Player software, have been distributing a version of their application trojanized with the OSX/Proton malware on their official website.Read More →
Snake, also known as Turla and Uroburos, is backdoor malware that has been around and infecting Windows systems since at least 2008. It is thought to be Russian governmental malwareRead More →
After last month security researchers discovered the first-ever Word document spreading macro malware on macOS, last week, researchers from Fortinet spotted a Word document that contained macro scripts that distributedRead More →
For many years, MAC Address Randomization was slated as the next big thing for protecting user privacy on the modern Internet. The standard, which works by deploying a new MACRead More →
A new form of malware is targeting Macs and launching denial-of-service attacks on users by creating multiple email drafts that crash the computer. The method is simple but devious. AccordingRead More →
Critical code-execution flaw resides in Windows, Mac, and Linux. Patch now. Developers with both Mozilla and Tor have published browser updates that patch a critical Firefox vulnerability being actively exploitedRead More →
Adwind author still has a lot of work ahead of him. Security researchers have observed an instance of the Adwind RAT dropping a Mac payload for the first time, but despiteRead More →
ome users might be able to remove KeRanger before it starts its encryption process and locks up all their files. Yesterday, the first ever fully functional ransomware family targeting Maccomputers hasRead More →
Apps that use 3rd-party updater over insecure HTTP channels subject to MiTM attacks. Camtasia, uTorrent, and a large number of other Mac apps are susceptible to man-in-the-middle attacks that installRead More →
Imagine this. Your girlfriend needs to type a very important report for her Accounting class but she forgot the password to her MacBook Pro. She tries and tries, but keepsRead More →
Swindlers impersonate Apple service that remotely accesses user desktops. For years, scammers claiming that they’re “calling from Windows” have dialed up Microsoft customers and done their best to trick themRead More →