The Conficker Worm and Mac OS X
A serious worm, that may affect Windows computers, has been getting a great deal of press lately, including a...

Most people think about hacking as something highly technical. They picture complex code, advanced technical skills, and someone deliberately breaking into a system. But in practice, it’s often much simpler than that. A lot of attacks start in everyday moments, like reusing the same password, clicking a link that looked safe, or trusting a message...

Apple has just released critically urgent security updates—including macOS Sequoia 15.4.1 and iOS 18.4.1—to address two zero-day vulnerabilities that have been actively exploited in...

Apple has AirPods for everyone: classic earbuds, in-canal AirPods Pro with noise cancellation, and over-ear AirPods Max.

Is your Mac running slow? Here's how to diagnose and fix performance issues and get your Mac to run faster.

Mac malware rarely announces itself as malware. It usually shows up as something ordinary: a free app download, a browser update, a sponsored search result, a cracked version of paid software, or a permission prompt you’re asked to approve...
A serious worm, that may affect Windows computers, has been getting a great deal of press lately, including a...
Security & Privacy + Software & Apps
Last week, we reported on two zero-day flaws in the latest version of the Firefox web browser. The Mozilla...
A number of Mac OS X kernel vulnerabilities have been publicized, according to Information Week. These five vulnerabilities are...
Security & Privacy + Software & Apps
Code to attack the Firefox browser was published on several web sites yesterday, prompting the Mozilla Foundation to announce...
Security & Privacy + Software & Apps
We have reported here about two scareware programs that target the Mac, Macsweepr and iMunizator, both of which are “rogue”...
Apple + Security & Privacy + Software & Apps
Charlie Miller, the security researcher who recently hacked a Mac in ten seconds (using an exploit he had developed...
Once again, security researcher Charlie Miller has won a hacker contest, the ConSecWest PWN2OWN Contest, by hacking a Mac...
It seems like it was just yesterday that we wrote about a new variant of the RSPlug Trojan horse....
“Writing exploits for Vista is hard work. Writing exploits for Mac is a lot of fun,” said Dino Dai...
Last December, we reported on a variant of the RSPlug Trojan horse that was taunting Intego through certain bits...