Researchers found an unfixable bug in Apple’s T2 Security Chip
Macs equipped with the T2 co-processor are susceptible to hacks that piggyback on a newsmaking vulnerability dubbed Checkm8. This security loophole has been around for quite some time, enabling gray hats to get around the protections in a series of iPhone models. However, the recent discovery of a method to exploit the Apple T2 Security Chip significantly inflates the adverse security implications...
Recent macOS Mojave security update got out of hand
The troublemaking update, flagged as 2020-005, went live on September 24, 2020. Shortly after the release, it became obvious that something went wrong with it. Numerous macOS Mojave users noticed their computers slow down to a crawl. This nuisance would be combined with memory bugs, long boot time, and unusually high fan speeds.
Crooks hoodwink Apple into green-lighting adware apps
The authors of notorious Mac adware found a workaround to fool Apple’s app notarization mechanism into allowing their code to run on Macs. The strain known as Shlayer can easily slip below the radar by making the system think it’s safe, while it’s not. In early 2020, Apple brought extra protection to the Mac by extensively checking third-party applications for dodgy characteristics such as code-signing inconsistencies.
Apple is slow to patch a Safari flaw that leads to data theft
A security enthusiast has published details on a Safari vulnerability Apple was planning to fix only a year after acknowledging the reported bug. The vulnerability was originally discovered by Pawel Wylecial who works for Poland-based cybersecurity services firm REDTEAM.PL. Technically, it is a bug in Web Share API, an interface allowing users to share browser content, such as text, links, and files, via third-party apps.
Xcode projects weaponized to distribute Mac malware
A sneaky strain of malware dubbed XCSSET is doing the rounds via poisoned Xcode projects, mostly affecting Safari and other browsers running on a victim’s Mac. The unorthodox infection chain has been recently discovered by a team of researchers at Trend Micro. According to their findings, malicious actors are exploiting Xcode projects to host and spread harmful payloads. For those uninitiated, Xcode is an integrated development environment (IDE) for macOS.
Macros vs macOS: advanced exploit chain targeting Macs
Well-known researcher unveils a new powerful exploit that allows executing malicious Office macros on a Mac computer with zero user interaction. Macros in Office documents are intended to facilitate the execution of iterative tasks. These are shortcuts to performing routine actions and therefore they are, ideally, both helpful and benign. However, in pursuit of workarounds to plague systems with malicious code, cybercriminals have been mishandling macros for years.