CloudChat infostealer Mac malware masquerades as “safe” service
The Mac Security Blog
by Joshua Long
5d ago
A self-proclaimed “secure” chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims’ Macs and installed backdoor malware. Learn more, including which messaging apps are actually safe to use. The post CloudChat infostealer Mac malware masquerades as “safe” service appeared first on The Mac Security Blog ..read more
Visit website
How to spot fake Apple security alerts via text, phone, email, or web
The Mac Security Blog
by Kirk McElhearn
5d ago
What should you do if you receive an email, text message, or phone call purporting to be from Apple? Is it legitimate? How can you find know for sure? We’ve got the answers. The post How to spot fake Apple security alerts via text, phone, email, or web appeared first on The Mac Security Blog ..read more
Visit website
Roku leaks 576,000 accounts—its second data breach of 2024
The Mac Security Blog
by Joshua Long
5d ago
Roku has already suffered two data breaches this year, about a month apart. Learn more about what steps you can take to protect all of your online accounts from similar attacks. The post Roku leaks 576,000 accounts—its second data breach of 2024 appeared first on The Mac Security Blog ..read more
Visit website
How to protect yourself from SIM swapping attacks
The Mac Security Blog
by Kirk McElhearn
5d ago
In SIM swapping attacks, fraudsters abuse a mobile phone company to take over a victim’s phone number. This can be used for identity theft, and could potentially expose your online accounts. Learn how to protect yourself. The post How to protect yourself from SIM swapping attacks appeared first on The Mac Security Blog ..read more
Visit website
How Hackers Can Take Over Your Phone by SIM Swapping – Intego Mac Podcast Episode 340
The Mac Security Blog
by Kirk McElhearn
6d ago
The popular streaming service Roku was hit with its second data breach this year, and the info of hundreds of thousands of users was exposed. Another Google service has met its end, we'll tell you about the newest resident of the Google graveyard. And take a deep dive into how hackers use SIM swapping attacks and how you can stop them. The post How Hackers Can Take Over Your Phone by SIM Swapping – Intego Mac Podcast Episode 340 appeared first on The Mac Security Blog ..read more
Visit website
Patches, Data Breaches, and Too Many Messaging Protocols – Intego Mac Podcast Episode 339
The Mac Security Blog
by Kirk McElhearn
1w ago
Both Apple and Microsoft have patched a lot of security vulnerabilities in updates to their operating systems. A new scam uses AI to put the squeeze on victims. Info from a years-old AT&T data breach has been made public and data from 10s of millions of users has been exposed. And Apple has said that the RCS messaging protocol is coming to its operating systems later this year. Just how many messaging protocols is too many? The post Patches, Data Breaches, and Too Many Messaging Protocols – Intego Mac Podcast Episode 339 appeared first on The Mac Security Blog ..read more
Visit website
“Unpatchable” flaw in Apple M1/M2/M3 chips: GoFetch is the new Spectre
The Mac Security Blog
by Joshua Long
2w ago
A serious flaw in Apple’s M1, M2, and M3 chips could enable attackers to break the security of Macs (and perhaps iPads and Apple Vision Pro). Here is everything you need to know about how GoFetch might affect you. The post “Unpatchable” flaw in Apple M1/M2/M3 chips: GoFetch is the new Spectre appeared first on The Mac Security Blog ..read more
Visit website
The Top 10 Mac and iPhone Malware of 2024’s First Quarter
The Mac Security Blog
by Joshua Long
2w ago
In the first few months of 2024, we have observed a constant stream of Mac malware and iPhone PUAs. Let’s take a look at the top ten threats from January through March 2024. The post The Top 10 Mac and iPhone Malware of 2024’s First Quarter appeared first on The Mac Security Blog ..read more
Visit website
Google forced to delete Chrome Incognito mode’s private browsing data
The Mac Security Blog
by Jay Vrijenhoek
2w ago
Google is in the doghouse for falsely claiming it couldn’t delete billions of data records it collected via Chrome’s Incognito mode. Learn more about the recent lawsuit, and how to browse more privately. The post Google forced to delete Chrome Incognito mode’s private browsing data appeared first on The Mac Security Blog ..read more
Visit website
Vintage, Obsolete, and a Few Anniversaries – Intego Mac Podcast Episode 338
The Mac Security Blog
by Kirk McElhearn
2w ago
Apple calls old devices "obsolete" and "vintage;” what exactly do these terms mean? Alternative iPhone app stores will soon be available in Europe and new details suggest that some extra effort will be required from users. And all of Apple's M-series processors all have a newly discovered vulnerability that can't be patched without some compromises on speed. The post Vintage, Obsolete, and a Few Anniversaries – Intego Mac Podcast Episode 338 appeared first on The Mac Security Blog ..read more
Visit website

Follow The Mac Security Blog on FeedSpot

Continue with Google
Continue with Apple
OR