REvil ransomware group hits Apple contractor, demands $50 million
A high-profile cybercrime clique raided the networks of Apple business partner Quanta Computer and now wants a huge ransom for nondisclosure of stolen data.
New Mac malware ambushing developers via a copycat npm package
Researchers discovered an offbeat malware sample arriving at Mac and Linux machines through a booby-trapped package on npm software hosting service.
Private Internet Access VPN review
Using Private Internet Access VPN is a sure-shot way to curb eavesdroppers, avoid geo-discrimination, and generally surf the web with peace of mind.
Outlook search not working on Mac – how to fix the issue
If you are getting a “No Results” error when trying to search for emails in the Outlook Mac app, these workarounds should address the problem.
"HPDM.framework / HPDeviceMonitoring.framework / HP Scanner 3 / HP Utility" will damage your computer" popup on Mac
If you are struggling to fix the "HP Scanner will damage your computer" alert issue on your Mac, here is a round-up of applicable options.
Remove go.loadingnow.me virus from Mac
Restless Mac malware makers have shown their true colors once again by spreading malware that redirects numerous users to junk sites via go.loadingnow.me.
XXI century cybercrime stats and what to expect in the 2020s
Get insights into the noteworthy cybercrime statistics for the XXI century and find out how the global threat landscape will change in the 2020s.
New XcodeSpy malware injects sneaky EggShell backdoor into Macs
Researchers unveiled a trojanized version of the Xcode development kit dubbed XcodeSpy that gives attackers broad backdoor access to infected Mac machines.
Apple fixes an arbitrary code execution flaw in Safari
In a series of updates tailor-made for its different platforms, Apple has rolled out important security fixes that address a serious Safari vulnerability.
Side effects of Apple’s security philosophy
The rigid control of software and hardware in Apple devices is both an obstacle to exploitation and a way for high-profile threat actors to persevere inside.