
Facebook Finds New iOS Spyware Phenakite
The iOS spyware threat Phenakite was discovered by Facebook. In this article: What it is | How it works | What iOS users should know.
April 26, 2021 • 7 min readThe iOS spyware threat Phenakite was discovered by Facebook. In this article: What it is | How it works | What iOS users should know.
April 26, 2021 • 7 min readAirTag is finally here. On this Checklist, we’ll tell you what it is, why some competitors are crying foul, and how it protects your privacy.
April 23, 2021 • 6 min readApple’s Spring Loaded event brings new iMacs, new iPad Pros, AirTag, and more. Details, Prices, Specs, and Availability.
April 21, 2021 • 6 min readWhat is Google’s FLoC? In this article, we’ll explain what FLoC is, why it may be a privacy threat, and how to check for it in your browser.
April 20, 2021 • 5 min readA Facebook data breach has exposed 500 million + users. On this episode of the Checklist: Details, how to check if you were affected, and staying safe.
April 16, 2021 • 9 min readThe FBI accessed hundreds of vulnerable computers using remote backdoors installed by hackers — with the goal of collecting evidence against the hackers and removing the backdoors. In a press release issued Tuesday, the U.S. Department of Justice announced the operation and explained the rationale behind it.
The 2021 Microsoft Exchange Server breach
Earlier this year, several critical zero-day vulnerabilities for Microsoft Exchange Server were discovered (Exchange is email server software common in enterprise environments).
The zero-days resulted in the hacks of thousands of organizations worldwide, with malicious actors accessing users’ email accounts …
April 14, 2021 • 5 min readA flaw in macOS TextEdit could have let attackers create malicious TXT files — files that could have led to DOS attacks, IP leaks, and more.
April 13, 2021 • 6 min readA Facebook data breach has exposed the personal information of more than 500 million users. In this article: Details | Impact | Staying Safe
April 7, 2021 • 6 min readAward-winning educator Robert Speciale shares strategies for communicating security and privacy concepts to today’s kids.
April 1, 2021 • 11 min readHow do we stop caller ID spoofing? This article shows how spoofing works, how STIR/SHAKEN helps, and why you shouldn’t let your guard down!
March 29, 2021 • 6 min readXcodeSpy is macOS malware that can install a persistent backdoor on a Mac. In this article, we’ll explain what it is, how it works, and how you can detect it!
March 25, 2021 • 7 min readA closer look at the recent Hobby Lobby data breach; talking about common misconceptions about “the cloud” with a cloud security expert.
March 25, 2021 • 7 min readIs the Clubhouse iOS app safe? We’ll talk about what Clubhouse is, the app’s security and privacy issues, and how to use it more safely.
March 24, 2021 • 7 min readIf you spend any time on the socials, you’ve heard people talk about Clubhouse. It’s been around for close to a year, though it’s really taken off over the past few months. We’ll look at its safety, then look at Privacy Labels with Clubhouse as a sort of yardstick.
Trouble in the Clubhouse?
Clubhouse is a new social media platform that’s drawing all kinds of attention. At the moment, it’s still in beta testing, and is only available as an iOS app.
So what does Clubhouse do? It’s actually pretty simple. The app …
March 21, 2021 • 4 min readPlanning to sell your Mac? This guide shows you how to make sure you aren’t exposing your private data to the new owner!
March 18, 2021 • 9 min readA security camera hack has exposed thousands of video feeds. This article has background, analysis, and tips for home security camera safety.
March 15, 2021 • 4 min readOn this podcast, we talk about avoiding tax scams both new and old. We cover “classic” tax scams as well as 2021 tax scams.
March 11, 2021 • 8 min readIn 2021, U.S. taxpayers should be on the lookout for these 4 tax scams. This article explains how they work, and how to keep yourself safe!
March 6, 2021 • 4 min readalso known as OSX/Morcut
Type:
Trojan Horse
Platform:
Mac OS X
Last updated:
02/09/16 9:14 pm
Threat Level:
High
Description
Crisis is a Trojan horse that creates a backdoor on infected systems. Also known as Morcut, Crisis was first discovered in 2012, with subsequent variants appearing in the years to follow.
Crisis comes in the form of an illegitimate Adobe Flash Player installer. If installed, Crisis takes steps to achieve persistence (the ability to survive reboots), and then performs several actions, the nature of which depends on whether or not the Trojan was launched with administrative permissions. On a system which …
March 6, 2021 • 2 min readType:
Adware
Platform:
Mac OS X
Last updated:
02/09/16 9:14 pm
Threat Level:
High
Description
Conduit is adware. Conduit was a platform that could be used to create custom toolbars — meant to be installed as browser extensions — that were ostensibly aimed helping web publishers market to their audiences more effectively. However, Conduit had a number of behaviors that are classified as malicious: It would make unauthorized changes to a user’s web browser, including changes to the home page, new tab page, and search engine.
Conduit’s illegitimate search engine, search.conduit.com, posed a clear privacy threat, since it collected highly …
March 6, 2021 • 2 min read