Apple Updates XProtect to Block Vulnerable Java Versions
Apple has released an update to its XProtect component of Mac OS X to block certain outdated versions of...

Cybersecurity affects every person who uses a device, connects to the internet, pays bills online, or stores important files digitally. The rise of cloud services, mobile apps, and complex online accounts has created new opportunities for criminals to target individuals. Mac users benefit from strong built-in protections, but threats now focus less on operating systems...

Apple has just released critically urgent security updates—including macOS Sequoia 15.4.1 and iOS 18.4.1—to address two zero-day vulnerabilities that have been actively exploited in...

It’s an age-old question: Should you shut down and restart your computer daily, or leave it running 24/7? Let’s explore the considerations for users...

Computer viruses continue to be a widespread and costly problem, affecting everyone from casual computer users to major organizations. Some of the most damaging...

For years, Mac users believed they were immune to viruses and other malicious software. Apple’s built-in defenses like Gatekeeper and XProtect reinforced that perception, and compared to Windows PCs, Macs historically faced fewer attacks. But times have changed. As...
Apple has released an update to its XProtect component of Mac OS X to block certain outdated versions of...
This is apparently the week for people to add interesting things to exploit kits! In case you’ve not already...
For those of you who are fans of the webcomic xkcd, you may recall the suggestion to use passphrases...
In a day filled with news of absolutely baffling decisions (Ben Affleck as Batman, really?!), it should perhaps come...
There is a document floating around with tips written by the NSA for making Macs more secure, which is...
Yesterday, Google’s Chrome team updated its web browser to Chrome version 29. The new Chrome 29.0.1547.57 for Mac (and other...
Once again, fraudulent developers are attempting to fool people into installing their adware by signing their file—which pretends to...
When we last heard from the researchers at Georgia Institute of Technology, they were demonstrating a proof of concept...
This has been an interesting month, with news about hacking a variety of unusual things. People have hacked cars,...
It’s that time of year again – time for a significant portion of the population to get ready to...