Mac ThiefQuest malware may not be ransomware after all

We discovered a new Mac malware, ThiefQuest, that appeared to be ransomware at first glance. However, once we dug in deeper, we found out its true identity—and intention.

Read more

New Mac ransomware spreading through piracy

We analyze a new Mac ransomware that appears to encrypt user files with a bit of a time delay.

Read more

A week in security (April 27 – May 3)

A roundup of the previous week’s security news, including cloud data protection, Troldesh, VPNs, the cybercrime economy, and more.

Read more

iOS Mail bug allows remote zero-click attacks

A newly-discovered vulnerability in iOS Mail can be used to attack an iPhone remotely using a malicious e-mail message, even if you’re running the latest version of iOS (13.4.1).

Read more

The passwordless present: Will biometrics replace passwords forever?

The effectiveness of passwords to protect data has long been debated. Many have called for the death of passwords, instead pushing for biometrics to secure their most precious information. But is biometrics really a better, safer option?

Read more

Mass surveillance alone will not save us from coronavirus

As governments roll out enormous data collection programs to limit coronavirus, we should remember that mass surveillance alone will not save us.

Read more

A week in security (January 20 – 26)

A roundup of the previous week’s most notable security stories and events, including tech support scams, deepfakes, and the latest ransomware attack in Florida.

Read more

New iOS exploit checkm8 allows permanent compromise of iPhones

A new exploit for iOS enables attackers to gain permanent access to iPhones, iPads, Apple Watches, and more—with zero potential for patching. Learn why this is possibly the biggest security news for iOS since its inception.

Read more

Unprecedented new iPhone malware discovered

Google announced late last night that hacked websites have been used to drop iPhone malware on unsuspecting users over a two-year period. Thomas Reed investigates.

Read more

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Read more

Select your language