The landscape for Mac malware has changed dramatically in the past couple of years: threats are now more complex, more varied, and more numerous.
macOS vulnerability allows “root” access without authentication.
Details of vulnerability released over Twitter by security researcher.
Compromised IoT devices could infect other home network-connected devices, including laptops, Mac, and even your smartphone.
macOS security has become a necessity, especially as cybercriminals get smarter about tricking users or identifying vulnerabilities.
Despite built-in security features, hackers can use your Mac to infiltrate your home or organization’s heating, lighting, or electronics systems.
How it works: Attackers compromise a vendor’s website, then replace legitimate apps with those carrying data-stealing malware.
Most garden-variety Mac threats covertly collect sensitive user data by bundling themselves with legitimate applications.
Steering clear of adware-serving threats can be difficult—many are bundled with software or appended to malicious email attachments.
Keranger was the first – but now experts see ransomware-as-a-service that enables interested “customers” to purchase Mac-hostile ransomware.
This malware’s striking characteristic: its ability to drop a payload individually designed for Windows, Linux, and Mac OS running devices.