HackDig : Dig high-quality web security articles for hacker

Mac adware is more sophisticated and dangerous than traditional Mac malware

As the data revealed in our State of Malware report showed, Mac threats are on the rise, but they are not the same type of threats experienced by Windows users. Most notably, more traditional forms of malware, such as ransomware, spyware, and backdoors account for over 27 percent of all Windows threats. That figure is less than 1 percent for Macs. Furthe
Publish At:2020-02-27 15:59 | Read:86 | Comments:0 | Tags:Mac adware bundlore crossrider mac Mac adware mac threats ma

Mac Malware Becomes More Common – Are You A Victim?

Behind the fancy interface and icons, the MacOS operating system which powers Apple computers is significantly different to alternatives like Microsoft Windows. The system has been built from the ground up to increase security and protect users. This design has been incredibly successful, allowing Apple to create the impression that iMacs and MacBooks are in
Publish At:2020-02-17 05:29 | Read:303 | Comments:0 | Tags:Mobile News Security antivirus for mac Mac

Malwarebytes Labs releases 2020 State of Malware Report

Malwarebytes Labs today released the results of our annual study on the state of malware—the 2020 State of Malware Report—and as usual, it’s a doozy. From an increase in enterprise-focused threats to the diversification of sophisticated hacking and stealth techniques, the 2019 threat landscape was shaped by a cybercrime industry that aimed to show i
Publish At:2020-02-11 04:50 | Read:261 | Comments:0 | Tags:Reports 2020 state of malware report adware Android android

Mac threat detections on the rise in 2019

Conventional wisdom has been that, although not invulnerable to cyberthreats (as some old Apple ads would have you believe), Macs are afflicted with considerably fewer infections than Windows PCs. However, when reviewing our 2019 Mac detection telemetry, we noticed a startling upward trend. Indeed, the times, they are a-changin’. To get a sense of h
Publish At:2019-12-16 16:50 | Read:390 | Comments:0 | Tags:Mac browser extensions Mac adware mac malware mac telemetry

New iOS exploit checkm8 allows permanent compromise of iPhones

UPDATE 9/27, 11:00am: Updated for the misconception that the bootrom was actually being modified. Apparently, the “permanent” only refers to the fact that the bug is in the bootrom, where it cannot be patched. UPDATE 9/27, 12:15am: After speaking with @axi0m8, clarified a few other points, including the fact that this cannot be exploited remot
Publish At:2019-09-27 23:20 | Read:1057 | Comments:0 | Tags:Mac Apple apple security apple vulnerability checkm8 exploit

Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website

by Luis Magisa Unlike in the pre-internet era, when trading in the stock or commodities market involved a phone call to a broker — a move which often meant additional fees for would-be traders — the rise of trading apps placed the ability to trade in the hands of ordinary users. However, their popularity has led to their abuse by cybercriminals who create fa
Publish At:2019-09-20 08:20 | Read:790 | Comments:0 | Tags:Mac Malware app Trojan

Proton malware spreading through supply-chain attack, victims should wipe their Macs

The dreaded Proton malware was spreading through a new supply-chain attack that involved the Elmedia apps, victims should wipe their Macs Bad news for Mac users, a new malware is threatening them of a complete system wipe and reinstall. Crooks are distributing the malware in legitimate applications, the popular Elmedia Player and download manager Folx develo
Publish At:2017-10-22 06:05 | Read:2616 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime Hacking Mac mal

MUGHTHESEC, a signed Mac adware that hijacks the victim’s browser for profit

Experts spotted a new signed Mac adware dubbed MUGHTHESEC that hijacks victim’s browser for profit and can be removed only reinstalling the OS. According to the expert Patrick Wardle, Director of Research at Synack, a new strain of Mac adware is threatening Mac users, once infected a machine the only way to remove it is to reinstall the macOS. The rese
Publish At:2017-08-13 23:35 | Read:3451 | Comments:0 | Tags:Breaking News Cyber Crime Malware adware Apple Mac malware M

Wikileaks Vault 7 – Imperial projects revealed the 3 hacking tools Achilles, SeaPea and Aeris

Wikileaks published another batch of classified documents from the CIA Vault 7 leak, it includes details of the Imperial project. Today another batch of classified documents from the CIA Vault 7 leak was published by Wikileaks. The documents are related to a CIA project codenamed ‘Imperial,’ they include details of three CIA hacking tools and im
Publish At:2017-07-28 04:35 | Read:2686 | Comments:0 | Tags:Breaking News Hacking Intelligence Malware Achilles Aeris CI

Vault7 Dark Matter batch – CIA has been targeting the iPhone supply chain since at least 2008

Wikileaks released the second bash of CIA’s Vault 7 dump, it contains other precious documents to understand the way CIA was hacking systems worldwide. The Wikileaks Vault 7 dump will make for a long time the headlines, the organization has just released another lot of classified documents related the hacking tools and techniques and exploit codes used
Publish At:2017-03-23 18:00 | Read:4268 | Comments:0 | Tags:Breaking News Intelligence Apple CIA Dark Matter Firmware Ha

Flaws in MAC address randomization implemented by vendors allow mobile tracking

Researchers devised a new attack method that can be leveraged to track mobile devices that rely on MAC address randomization mechanism. The MAC address is a unique and an hardcoded identifier assigned to a device’s network interface. This characteristic makes it an excellent tool for the tracking of the devices. A group of researchers from the U.S. Naval Aca
Publish At:2017-03-12 23:40 | Read:5405 | Comments:0 | Tags:Uncategorized Android iOS Mac MAC address randomization priv

Unix: A Game Changer in the Ransomware Landscape?

by Joachim Suico (Threat Research Engineer) 2016 was the year when ransomware reigned. Bad guys further weaponized extortion into malware, turning enterprises and end users into their cash cows by taking their crown jewels hostage. With 146 families discovered last year compared to 29 in 2015, the rapid expansion and development of ransomware is projected to
Publish At:2017-02-13 22:40 | Read:4375 | Comments:0 | Tags:Ransomware Linux Mac OSX ransomware Unix

What You Need To Know About The iMessage Security Flaw

With everything that’s gone down in 2016 it’s easy to forget Tim Cook’s and Apple’s battle with the FBI over data encryption laws. Apple took a strong stance though, and other tech giants followed suite leading to a victory of sorts for (the little guy in) online privacy. In this era of web exposure, it was a step in the right direction for those who feel ou
Publish At:2017-01-20 12:10 | Read:3241 | Comments:0 | Tags:Technology Apple cybersecurity iPhone Mac

Hacking Apple Mac encryption password in Just 30 Seconds with PCILeech device

A hacker devised a $300 device, dubbed PCILeech, that could be exploited by an attacker to gain full control of a Mac or MacBook. The Swedish hacker and penetration tester Ulf Frisk has devised a $300 device, dubbed PCILeech, that could be exploited by an attacker to gain full control of a Mac or MacBook. The device is able to steal the password from virtual
Publish At:2016-12-17 16:40 | Read:3676 | Comments:0 | Tags:Breaking News Hacking Apple DMA Mac PCILeech

Experts spotted a Skype backdoor for Mac, it could be a coding bug

Experts from Trustwave discovered an authentication bypass vulnerability affecting the Mac version of Skype, experts classified it as a Skype backdoor. Security experts from Trustwave have discovered a backdoor in the Mac version of Skype. The flaw, aAn authentication bypass vulnerability, affects the Desktop API that could be used by third-party apps to imp
Publish At:2016-12-14 14:15 | Read:4785 | Comments:0 | Tags:Breaking News Hacking backdoor coding Mac Skype


Share high-quality web security related articles with you:)


Tag Cloud