HackDig : Dig high-quality web security articles

What Do QuickTake, iSight, and iBook Have in Common? How Apple Reuses Trademarks

Apple owns a lot of trademarks and service marks; this "non-exhaustive list" includes dozens of them, registered over the four-and-a-half decades since the company was founded. There are iconic product names, such as iPod and iPhone; software, such as iCal and iTunes; and services, such as Apple Music and iCloud. These names are a key part of App
Publish At:2022-08-15 04:23 | Read:100 | Comments:0 | Tags:Apple

What Personal Data Do Companies Track?

Private tech companies gather tremendous amounts of user data. These companies can afford to let you use social media platforms free of charge because it’s paid for by your data, attention, and time.   Big tech derives most of its profits by selling your attention to advertisers — a well-known business model. Various documentaries (like Netflix’s “The Social
Publish At:2022-08-03 20:00 | Read:318 | Comments:0 | Tags:Tips & Tricks Apple Amazon apps personal data IP address dat

How to Stay One Step Ahead of Hackers

Whether using the internet for play or work, you want to spend your time online enjoying the peace of mind that comes with having a secure network.  You don’t want to contend with someone taking your personal data — whether it’s credit card information, passwords, or bank account details — via malware or a data breach on your Android, Windows, or Apple iOS d
Publish At:2022-08-03 20:00 | Read:370 | Comments:0 | Tags:Tips & Tricks android Apple malware social media cybercrimin

Is someone stalking you with an Apple AirTag?

Apple’s AirTag has proven to be an excellent option for keeping track of items prompt to get stolen or lost. A whole list of people with lost pieces of luggage managed to reunite with their belongings thanks to Apple’s tracking products. AirTags help find keys and anything else people may want to follow, such as pets. However, recent events have
Publish At:2022-07-29 03:42 | Read:332 | Comments:0 | Tags:Mobile News Mobile Security privacy Security AirTag Apple Pr

Apple fixes multiple flaws in iOS, iPadOS, macOS, tvOS, and watchOS devices

Apple released security updates to address multiple vulnerabilities that affect iOS, iPadOS, macOS, tvOS, and watchOS devices. Apple released security updates to fix 37 vulnerabilities impacting iOS, iPadOS, macOS, tvOS, and watchOS devices. The flaws addressed by Apple lead to arbitrary code execution, privilege escalation, denial-of-service (DoS),
Publish At:2022-07-21 05:26 | Read:235 | Comments:0 | Tags:Breaking News Security Apple Hacking hacking news informatio

New CloudMensis malware backdoors Macs to steal victims’ data

Unknown threat actors are using previously undetected malware to backdoor macOS devices and exfiltrate information in a highly targeted series of attacks.ESET researchers first spotted the new malware in April 2022 and named it CloudMensis because it uses pCloud, Yandex Disk, and Dropbox public cloud storage services for command-and-control (C2) communicatio
Publish At:2022-07-19 09:48 | Read:382 | Comments:0 | Tags:Security Apple Cloud

M2 MacBook Air Review – New Form Factor for Apple’s Most Popular Mac

When Apple released the first MacBook Air in 2008, it seemed like it might be a gimmick. Steve Jobs revealed the device at a Macworld Expo keynote by sliding out of a manila envelope, suggesting that it could be shipped as a letter, not a package; its light weight and extreme thinness were its defining characteristics. While the debut model was not extreme
Publish At:2022-07-18 07:32 | Read:359 | Comments:0 | Tags:Apple Recommended MacBook Air

Endpoint security for Mac: 3 best practices

If you’re one of the 50% of small and medium-sized businesses (SMBs) that use Mac devices today, chances are your IT and security teams have a ton of Mac endpoints to monitor.  Securing that many endpoints can get really complex, really fast, especially when you consider that the common wisdom that Macs don’t get malware simply isn’t true: in fact, t
Publish At:2022-07-14 11:52 | Read:450 | Comments:0 | Tags:Business adware Apple dns filtering endpoint detection and r

Lockdown Mode: Apple to protect users from targeted spyware attacks

Apple has previewed a new feature which aims to harden high-risk users from the serious threat of being spied upon by enemy states and intelligence agencies.“Lockdown Mode” is scheduled to arrive later this year with the release of Apple iOS 16 and macOS Ventura. It’s an optional feature for users who believe their computers and smartphones
Publish At:2022-07-07 13:00 | Read:445 | Comments:0 | Tags:Cyber Security Featured Articles Apple Authentication iPhone

Apple’s new Lockdown Mode defends against government spyware

Apple announced that a new security feature known as Lockdown Mode will roll out with iOS 16, iPadOS 16, and macOS Ventura to protect high-risk individuals like human rights defenders, journalists, and dissidents against targeted spyware attacks.Once enabled, the Lockdown Mode will provide Apple customers with messaging, web browsing, and connectivity protec
Publish At:2022-07-06 17:56 | Read:458 | Comments:0 | Tags:Apple Security

Install macOS Ventura Beta in a Virtual Machine on an M1 or M2 Mac with UTM

We recently looked at how you can use UTM to run Windows 11 on your M1 or M2 Mac for free. UTM is free, open-source virtualization software, that allows you to run other operating systems on your Mac. In addition to allowing you to run Windows and Linux – and even MacOS 9.2 – you can also install macOS Monterey, and even create a virtual machin
Publish At:2022-07-05 07:32 | Read:560 | Comments:0 | Tags:Apple macOS Ventura

Hermit spyware is deployed with the help of a victim’s ISP

Google’s Threat Analysis Group (TAG) has revealed a sophisticated spyware activity involving ISPs (internet service providers) aiding in downloading powerful commercial spyware onto users’ mobile devices. The spyware, dubbed Hermit, is reported to have government clients much like Pegasus. Italian vendor RCS Labs developed Hermit. The spyware
Publish At:2022-06-29 07:53 | Read:655 | Comments:0 | Tags:Privacy Reports Android Apple C2 command and control commerc

Google expert detailed a 5-Year-Old flaw in Apple Safari exploited in the wild

Google Project Zero experts disclosed details of a 5-Year-Old Apple Safari flaw actively exploited in the wild. Researchers from the Google Project Zero team have disclosed details of a vulnerability in Apple Safari that was actively exploited in the wild. The vulnerability, tracked as CVE-2022-22620, was fixed for the first time in 2013, but in 2016 e
Publish At:2022-06-20 11:08 | Read:502 | Comments:0 | Tags:Breaking News Hacking Apple data breach hacking news informa

Apple’s Planned Obsolescence: iOS 16, macOS Ventura Drop Support for Many Models

The idea of “planned obsolescence” has been around for about 100 years. It is said to have begun in the automobile industry, when GM decided that, to increase flagging sales, the company would make new models every year. Of course, the general concept really began much earlier: look at fashion, where designers decide what people wear each year,
Publish At:2022-06-16 04:42 | Read:1420 | Comments:0 | Tags:Apple iOS iOS 16 macOS macOS Ventura watchOS IOS

PACMAN, a new attack technique against Apple M1 CPUs

PACMAN is a new attack technique demonstrated against Apple M1 processor chipsets that could be used to hack macOS systems. PACMAN is a novel hardware attack technique that can allow attackers to bypass Pointer Authentication (PAC) on the Apple M1 CPU. The pointer authentication codes (PACs) allow to detect and guard against unexpected
Publish At:2022-06-11 10:31 | Read:1174 | Comments:0 | Tags:Breaking News Hacking Security Apple Apple M1 chip hacking n


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud