Keyword: mac
-
Earlier this year Forbes reported on an especially creepy strain of malware known as FruitFly targeting Apple Macs. At the time, it was unclear just what the spy tool was for, though it appeared to be used for surveilling people's personal Macs, in particular peeping at them through their webcam. Now the U.S. Department of Justice has unveiled an indictment against 28-year-old North Royalton, Ohio, resident Phillip Durachinsky, who is not only accused of spying on Apple Mac owners via Fruitfly but also of producing child pornography. Prosecutors alleged Durachinsky had been installing spyware on people's PCs for more than...
-
Apple’s iPhones, iPads and Mac computers are all vulnerable to the major processor flaws revealed on Wednesday, the company has warned, but it says updates are already available. The flaws known as Meltdown and Spectre affect almost every modern computing device from all manufacturers using chip designs from Intel, AMD and ARM. Apple uses Intel processors in its Mac computers and ARM-based designs for its A-series processors used in the iPhone, iPad, Apple TV and Apple Watch lines. Apple said: “All Mac systems and iOS devices are affected, but there are no known exploits impacting customers at this time.” The...
-
On many occasions, I will be working on a previously-saved Word document. Normally, after I make changes and save, it simply gets saved--that is, I get NO window to name the file, because the file already exists. Sometimes, however, when I save such an open, already-created file, the name of the file suddenly changes to be a work file. At the same time, I get the window and dialog for saving a file and specifying a location. I then have to re-save that file, because if I don't, I lose not only that work file but also the previously-saved file...
-
Update: Apple has acknowledged the issue and is working on it. Statement and workaround below. Wow, this is a bad one. On Macs running the latest version of High Sierra — 10.13.1 (17B48) — it appears that anyone can log in just by putting “root” in the user name field. This is a huge, huge problem. Apple will fix it probably within hours, but holy moly. Do not leave your Mac unattended until this is resolved. The bug is most easily accessed by going to Preferences and then entering one of the panels that has a lock in the lower...
-
Update your software and make sure you run full scan. Be damn sure you check the "nexdefinstall.dmg" file and let your virus protection fix it.
-
Jurisdictions carry no weight in My courts for as Creator I Reign Supreme ! Do you see my children I AM The First and The Last Word as Mediator over All Creation and it is My hand that is the Gavel of Authority and My answer was given on The Cross " IT IS FINISHED " You are Worthy and My blood has dressed you in My Righteousness and My Answer to the enemy for you shall forever be " NOT GUILTY " and surely goodness and mercy shall follow you ALL the days of your life and you SHALL...
-
Antifa it pretty big when it comes to one sided fights with the PoPo at their back turning a blind eye to their lawlessness. How bout Mutual Armed Combat somewhere out on the plain with both parties Left and Right armed only with any wooden implement of their choice? No guns knives or axes etc. Would they still be all they think they are given the chance for real combat? I still remember gang fights at the quarry when i was young, lotta blood but nobody ever got killed, then again that was long ago and far away... just my...
-
Has Microsoft finally caught up to Apple? The latest reviews of Microsoft’s new laptops hint that Apple’s cachet (and price points) may be wearing thin among consumers. Verto Analytics conducted a Smart Poll of current Windows owners (among U.S. adults, ages 18 and above) and asked them if they planned to buy an Apple as their next computer (either laptop or desktop) in the next 6-24 months. We also asked current Mac owners about their intentions to switch to a Windows machine within the next 6-24 months. Windows Owners Are More Likely to Make a Switch to Mac According to...
-
Link only due to copyright issues: Here’s hoping the iMac Pro learns from the Mac Pro’s mistakes (LINK ONLY - ARStechnica) iMac Pro iMac Pro internals
-
A Russian-backed bit of malware called Snake has been ported to macOS, according to security blog Fox-IT (via Malwarebytes Labs). Snake is a trojan disguised to look like a Flash installer, and it’s been around on Windows since 2008 and Linux since 2014.Snake Trojan on macOS Snake Trojan on macOS While malware, Snake is technically a Trojan, so it relies on tricking the user into installing it with their own password. It’s in the wild in a file named Install Adobe Flash Player.app.zip. The Snake Trojan on macOS installer is signed by a (currently) legit developer certificate issued to a...
-
We learned recently that macOS malware grew by 744% last year, though most of it fell into the less-worrying category of adware. However, a newly-discovered piece of malware (via Reddit) falls into the ‘seriously nasty’ category – able to spy on all your Internet usage, including use of secure websites.Security researchers at CheckPoint found something they’ve labelled OSX/Dok, which manages to go undetected by Gatekeeper and stops users doing anything on their Mac until they accept a fake OS X update … OSX/Dok does rely on a phishing attack as its initial way in. Victims are sent an email claiming to...
-
The program’s creator asks for payments but doesn’t have the encryption key to unlock victims’ files A new file-encrypting ransomware program for macOS is being distributed through BitTorrent websites, and users who fall victim to it won’t be able to recover their files, even if they pay. Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and it’s a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it. OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere...
-
Security researchers found a macOS version of the X-Agent malware used by the APT28 cyberespionage Security researchers have discovered a macOS malware program that’s likely part of the arsenal used by the Russian cyberespionage group blamed for hacking into the U.S. Democratic National Committee last year. The group, which is known in the security industry under different names, including Fancy Bear, Pawn Storm, and APT28, has been operating for almost a decade. It is believed to be the sole user and likely developer of a Trojan program called Sofacy or X-Agent. X-Agent variants for Windows, Linux, Android, and iOS have...
-
The personal desktop computer used to once be an exclusive and expensive machine, though we now know it and its laptop counterpart as a mass-market commodity that most people can afford. This week, however, the companies that defined the personal computer, Microsoft and Apple, gave us a glimpse of the future and it looks like a return to the past: the PC is going back to being an exclusive and expensive machine. Set aside all the explosions of color on gorgeous, high-resolution displays. Ignore the glamorous promo videos and the ultrathin, all-metal chassis of the new Surface Studio and MacBook...
-
Due to copyright concerns this will be link only article. Read all about it at the Ars Technica site: New attack that cripples HTTPS crypto works on Macs, Windows, and Linux (link Only due to ©)
-
Researchers have discovered that image files can bury malware, allowing malicious code access without detection. Security flaws which affect both Apple iOS and Mac devices permit attackers to grab your passwords and data, researchers claim. According to researchers from Cisco's Talos, a set of five vulnerabilities, if exploited, could lead to data theft and remote code execution -- which in its worst state may result in device hijacking. The set of bugs, CVE-2016-4631, CVE-2016-4629, CVE-2016-4630, CVE-2016-1850, and CVE-2016-4637, are all caused by how Apple processes image formats. Apple offers APIs as interfaces for accessing image data, and according to Talos,...
-
Some security experts who inspected that new version of iOS got a big surprise. They found that Apple had not obscured the workings of the heart of its operating system using encryption as the company has done before. Crucial pieces of the code destined to power millions of iPhones and iPads were laid bare for all to see. That would aid anyone looking for security weaknesses in Apple’s flagship software. Security experts say the famously secretive company may have adopted a bold new strategy intended to encourage more people to report bugs in its software—or perhaps made an embarrassing mistake....
-
The web platform is capable of amazing things. Thanks to the ongoing hard work of standards bodies, browser vendors, and web developers, web standards are feature-rich and continuously improving. The WebKit project in particular emphasizes security, performance, and battery life when evaluating and implementing web standards. These standards now include most of the functionality needed to support rich media and interactive experiences that used to require legacy plug-ins like Adobe Flash. When Safari 10 ships this fall, by default, Safari will behave as though common legacy plug-ins on users’ Macs are not installed. On websites that offer both Flash and...
-
Apple has released previews of its upcoming mobile and desktop operating systems, introducing several new features as well as opening up some built-in applications to third-party app coders. Apple's desktop operating system is dropping the OS X moniker in favour of macOS, Apple said at its Worldwide Developer Conference (WWDC) in San Francisco today. The Siri digital assistant will make it into the next version of macOS, which has been dubbed 'Sierra'. Siri on Sierra can be used to find files and documents, calendaring and messages. Search results from Siri in the macOS notifications centre can also be copied and...
-
The first known ransomware targeted at Apple's Mac computers was only downloaded about 6500 times, according to a representative for the Transmission project, whose software was used to launch the attack. Transmission representative John Clay said the ransomware was added to disk-image of its software after the project's server was compromised in an attack. "We're not commenting on the avenue of attack, other than to say that it was our main server that was compromised," he said. "The normal disk image [was] replaced by the compromised one." He said security on the server had since been increased and the group...
|
|
|