Face ID with a Mask; Barcodes with Stamps; and Problems with OneDrive – Intego Mac Podcast Episode 225
We look at some Face ID tricks for you, your iPhone, and your mask. OneDrive and Dropbox run into...
A highly sophisticated phishing e-mail campaign is exploiting Google’s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here’s what to watch out for so you don’t fall victim to this scam.
Apple has just released critically urgent security updates—including macOS Sequoia 15.4.1 and iOS 18.4.1—to address two zero-day vulnerabilities that have been actively exploited in...
You can connect a surprising variety of things to iPhones and iPads via their USB-C (or Lightning) ports, including storage devices, SD card readers,...
23andMe, the popular DNA ancestry and traits service, has filed for Chapter 11 bankruptcy. Should you tell the company to delete your data and...
Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.
We look at some Face ID tricks for you, your iPhone, and your mask. OneDrive and Dropbox run into...
DazzleSpy; Safari; vulnerability; malware. Nuff said? Don't worry, we'll have more. There's quite a bit of money to be...
On Wednesday this week, Apple released updates to all of its operating systems and Safari. Let’s take a look...
DazzleSpy is the latest Mac malware to make headlines. Intriguingly, it has the hallmarks of a state-sponsored, cyber-espionage campaign....
End-to-end encryption protects your data, your privacy, and your bank accounts in many ways.
A new Safari vulnerability can leak your browser history, 5G can interfere with airplane altimeters, Google Analytics is being...
SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware—it’s cross-platform...
New SysJoker malware attacks Mac, Windows, and Linux computers. Apple has difficulty managing scams and copycat apps in its...
Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device....
Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI...