Another Mac OS X Server Hack?
In a recent article, we reported on Tom Yager, a journalist for InfoWorld, who suspected that his Mac OS...
A highly sophisticated phishing e-mail campaign is exploiting Google’s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here’s what to watch out for so you don’t fall victim to this scam.
Apple has just released critically urgent security updates—including macOS Sequoia 15.4.1 and iOS 18.4.1—to address two zero-day vulnerabilities that have been actively exploited in...
You can connect a surprising variety of things to iPhones and iPads via their USB-C (or Lightning) ports, including storage devices, SD card readers,...
23andMe, the popular DNA ancestry and traits service, has filed for Chapter 11 bankruptcy. Should you tell the company to delete your data and...
Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.
In a recent article, we reported on Tom Yager, a journalist for InfoWorld, who suspected that his Mac OS...
The latest issue of MacFormat Magazine, the UK’s leading Mac publication, has a no-holds-barred test of six Mac antivirus...
Security & Privacy + Software & Apps
Microsoft has released Microsoft Office 2008 for Mac Service Pack 1, a major update to Office 2008, which also...
Kait Duplaga, an Apple store employee, who lives in White Plains, NY, had two of her Apple laptops stolen...
Security & Privacy + Software & Apps
Adobe has issued a security bulletin regarding security updates to “Adobe Reader 8.1.1 and earlier versions Adobe Acrobat Professional,...
Security & Privacy + Software & Apps
Facebook is currently the most popular social networking site on the Internet. With the ability to find friends, communicate...
An article in The Register reminds us that the very first spam e-mail was sent on May 3, 1978,...
While we usually discuss here the type of computer security that affects your data, operating system and personal identity,...
An article on The Register discusses problems with a security vendor’s certification of hacker-free web sites not being totally...
The annual Defcon hackers’ conference this August is featuring a strange competition. Called Race to Zero, it is described...