A Google bug breaks the search results in Safari
A bug in the Google search engine breaks the links shown in the search results if the link contains a plus symbol (+) Digital forensics specialists have reported the appearanceRead More →
A bug in the Google search engine breaks the links shown in the search results if the link contains a plus symbol (+) Digital forensics specialists have reported the appearanceRead More →
The flaw allows malicious actors to avoid privacy measures An expert in cybersecurity and ethical hacking was able to demonstrate that Apple’s latest privacy protection implementations on macOS are notRead More →
The attack comes from a flaw in Apple Safari browser A newly developed cyberattack proof of concept can cause iOS devices to restart or collapse using only 15 lines ofRead More →
The flaw would allow hackers to bypass security measures by invisible clicking According to a research carried out by an expert in enterprise network security, a Mac computer with the latestRead More →
The perception about Apple devices is that they are protected from attacks by default which is not true. Information security training researchers at Trend Micro have discovered a new malware which theyRead More →
Last week companies specialized in cyber security discovered the existence of a new Persistent Advanced Threat APT, supposedly sponsored by Dark Caracal, an organization dedicated to espionage. Since 2012, he has performedRead More →
I’m on a plane again…this time flying home from one of my favorite hacker cons: ShmooCon! I was stoked to give a talk about auditing on macOS. Yah, I know that doesn’tRead More →
There’s a newly discovered security hole in the current version of macOS High Sierra that allows anyone with access to your Mac to unlock your App Store System Preferences withoutRead More →
Here’s how to protect yourself until Apple patches bafflingly bad bug. In one of Apple’s biggest security blunders in years, a bug in macOS High Sierra allows untrusted users toRead More →
Mac malware, Proton, is spreading through a legitimate security company. Security researchers spotted criminals using search poisoning to get more targets and leverage the credibility of Symantec in the industry.Read More →