A Zoom vulnerability, and the war between the hackers and the developers
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
32 articles
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
FinSpy spyware targets Android, iOS, macOS, Windows, and Linux users. Here’s what it can do and how to stay protected.
Tired of never-ending notifications? Here is how to turn them off on Apple computers.
What’s the difference between the malware adapted for Apple’s new M1 chip and the sort written for good old x86 processors.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
Password management is one of the most essential and yet probably the most annoying of security measures. Short passwords are easy to remember, but they’re insecure; long and strong passwords