Apple is slow to patch a Safari flaw that leads to data theft
A security enthusiast has published details on a Safari vulnerability Apple was planning to fix only a year after acknowledging the reported bug.
Xcode projects weaponized to distribute Mac malware
A sneaky strain of malware dubbed XCSSET is doing the rounds via poisoned Xcode projects, mostly affecting Safari and other browsers running on a victim’s Mac.
Macros vs macOS: advanced exploit chain targeting Macs
Well-known researcher unveils a new powerful exploit that allows executing malicious Office macros on a Mac computer with zero user interaction.
Researcher unveils a new macOS security flaw
A developer has found a vulnerability that allows an attacker to bypass privacy protections in macOS Mojave and later versions of the operating system.
Safari 14 will introduce Face ID and Touch ID for the web
Apple is bridging the gap between its proprietary biometric authentication features and websites for a seamless sign-in experience not relying on passwords.
Malware authors use a new trick to circumvent macOS Catalina defenses
Security researchers discovered an unusual malware campaign targeting Mac computers that gets around the security mechanisms built into macOS Catalina.
Apple launches a new project to boost password security
Apple is up to enhancing its users’ authentication practices by releasing a list of password criteria for developers and password management services.
Apple pays researcher $100,000 for reporting a new security bug
A developer earns a bug bounty reward for reporting a Sign in with Apple zero-day vulnerability that could allow a hacker to access users’ online accounts.
Apple sends 11 email advisories alerting users to security loopholes
Apple has issued email advisories covering 11 security flaws in its software and hardware products, with the fixes being available through the latest updates.
Major Thunderbolt security loopholes fuel data theft, Macs partially affected
A Dutch researcher has unearthed critical flaws in Intel’s Thunderbolt interface that allow an attacker to hack a vulnerable system in minutes.