Lost Apple AirTag Can Lead Finder to Malicious Website
If you find an AirTag, be careful.
A highly sophisticated phishing e-mail campaign is exploiting Google’s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here’s what to watch out for so you don’t fall victim to this scam.
Apple has just released critically urgent security updates—including macOS Sequoia 15.4.1 and iOS 18.4.1—to address two zero-day vulnerabilities that have been actively exploited in...
You can connect a surprising variety of things to iPhones and iPads via their USB-C (or Lightning) ports, including storage devices, SD card readers,...
23andMe, the popular DNA ancestry and traits service, has filed for Chapter 11 bankruptcy. Should you tell the company to delete your data and...
Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.
If you find an AirTag, be careful.
It's more expensive than the previous model, but nothing matches the compact size and power of the new iPad...
As is often the case, the iPhone 13 pro is an iteration on last year's model. But if you...
An iOS security researcher has publicly disclosed three zero-day vulnerabilities in Apple’s mobile operating systems—and a fourth that is...
A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan...
A new report claims that telltale signs of Pegasus spyware have been identified on at least five current French...
Apple has just released iOS 12.5.5, a security-only update for iOS 12. Some in the security industry had wondered...
There's new Mac malware hiding in a terminal emulator app, an interesting Finder vulnerability, and Apple launches iCloud+. We...
Apple isn't prompting iPhone and iPad users to upgrade to iOS 15.
An independent researcher has just published details of a “macOS Finder RCE” (remote code execution) vulnerability. The bug effectively...