Results for

Checklist 227: Playing AirTag

Checklist 227: Playing AirTag

AirTag is finally here. On this Checklist, we’ll tell you what it is, why some competitors are crying foul, and how it protects your privacy.

April 23, 2021 • 6 min read
FBI accessed hundreds of private computers in Microsoft Exchange remediation bid

FBI accessed hundreds of private computers in Microsoft Exchange remediation bid

The FBI accessed hundreds of vulnerable computers using remote backdoors installed by hackers — with the goal of collecting evidence against the hackers and removing the backdoors. In a press release issued Tuesday, the U.S. Department of Justice announced the operation and explained the rationale behind it. 

The 2021 Microsoft Exchange Server breach

Earlier this year, several critical zero-day vulnerabilities for Microsoft Exchange Server were discovered (Exchange is email server software common in enterprise environments).

The zero-days resulted in the hacks of thousands of organizations worldwide, with malicious actors accessing users’ email accounts …

April 14, 2021 • 5 min read
XcodeSpy Mac Malware Targets Developers

XcodeSpy Mac Malware Targets Developers

XcodeSpy is macOS malware that can install a persistent backdoor on a Mac. In this article, we’ll explain what it is, how it works, and how you can detect it!

March 25, 2021 • 7 min read
Checklist 223: Visiting Clubhouse and Revisiting App Privacy Labels

Checklist 223: Visiting Clubhouse and Revisiting App Privacy Labels

If you spend any time on the socials, you’ve heard people talk about Clubhouse. It’s been around for close to a year, though it’s really taken off over the past few months. We’ll look at its safety, then look at Privacy Labels with Clubhouse as a sort of yardstick.

Trouble in the Clubhouse?

Clubhouse is a new social media platform that’s drawing all kinds of attention. At the moment, it’s still in beta testing, and is only available as an iOS app.

So what does Clubhouse do? It’s actually pretty simple. The app …

March 21, 2021 • 4 min read
Crisis

Crisis

also known as OSX/Morcut

Type:
Trojan Horse

Platform:
Mac OS X

Last updated:
02/09/16 9:14 pm

Threat Level:
High

Description

Crisis is a Trojan horse that creates a backdoor on infected systems. Also known as Morcut, Crisis was first discovered in 2012, with subsequent variants appearing in the years to follow.

Crisis comes in the form of an illegitimate Adobe Flash Player installer. If installed, Crisis takes steps to achieve persistence (the ability to survive reboots), and then performs several actions, the nature of which depends on whether or not the Trojan was launched with administrative permissions. On a system which …

March 6, 2021 • 2 min read
Conduit

Conduit

Type:
Adware

Platform:
Mac OS X

Last updated:
02/09/16 9:14 pm

Threat Level:
High

Description

Conduit is adware. Conduit was a platform that could be used to create custom toolbars — meant to be installed as browser extensions — that were ostensibly aimed helping web publishers market to their audiences more effectively. However, Conduit had a number of behaviors that are classified as malicious: It would make unauthorized changes to a user’s web browser, including changes to the home page, new tab page, and search engine.

Conduit’s illegitimate search engine, search.conduit.com, posed a clear privacy threat, since it collected highly …

March 6, 2021 • 2 min read