SecurityType:
Adware
Platform:
Mac OS X
Last updated:
02/09/16 9:14 pm
Threat Level:
High
Description
AskToolbar is adware, though it is sometimes classified as a Potentially Unwanted Program as well. AskToolbar is typically bundled with other software as an add-on during the installation process (this is very common, for example, during the installation of Oracle’s Java). The installer program for the primary application gives users the option to add the Ask toolbar and make Ask their primary search engine. This option is often pre-selected by default. AskToolbar is then installed as a browser extension on the user’s system, and …
March 6, 2021 •
1 min read
Securityalso known as OSX/ARDScript.A, OSX/Hovdy.A
Type:
Trojan Horse
Platform:
Mac OS X
Last updated:
02/09/16 9:14 pm
Threat Level:
High
Description
AppleScriptTHT is a trojan horse. First spotted in the wild in 2008, the malware was discovered when it was offered for distribution on a hacker website, with site forum members discussing possible delivery vectors which included the messaging app iChat and the filesharing service LimeWire.
In order to become infected, a user must first download and launch AppleScriptTHT. Once installed, the Trojan exploits a vulnerability in the Apple Remote Desktop Agent in order to gain administrative privileges on the infected …
March 6, 2021 •
2 min read
Securityalso known as OSX/ABK
Type:
Keylogger
Platform:
Mac OS X
Last updated:
02/04/20 9:53 am
Threat Level:
High
Description
Aobo is a keylogger marketed as a child and employee monitoring tool, but like all keystroke logging software, it can be used to monitor the activities of any computer on which it is installed.
Formerly offered by Awosoft Co., Ltd., and related to the Amac and EaseMon keyloggers, Aobo has both Standard and Professional editions. Aobo is designed to run silently in the background on a host computer, and can only be accessed using a special hotkey set up by the person …
March 6, 2021 •
2 min read
SecurityType:
Keylogger
Platform:
Mac OS X
Last updated:
02/09/16 9:14 pm
Threat Level:
High
Description
AnyKL is a keylogger. Like all forms of keystroke logging software, AnyKL can record the activity of all users of the computer on which it is installed.
AnyKL records keystrokes entered on the system as well as information about which application was being used at the time. The Professional Edition of AnyKL also supports password capture. In addition to logging keystrokes, the app takes system screenshots, records user web activity, and tracks program launches and app installations. AnyKL covertly transmits all logs to an email …
March 6, 2021 •
1 min read
Securityalso known as OSX/AMK.A, OSX/AMK.B, OSX/AMK.C
Type:
Keylogger
Platform:
Mac OS X
Last updated:
03/02/19 12:34 am
Threat Level:
High
Description
Amac is a keylogger marketed as a monitoring tool for employers, parents, and schools. However, like all keystroke logging software, it can be used to record the activity of any computer on which it is installed.
Formerly offered by Amac Software Co., Ltd., and related to the Aobo and EaseMon keyloggers, Amac is designed to run undetected in the background of the Mac on which it is installed, without any telltale icons or folders visible to the user. The software …
March 6, 2021 •
2 min read
SecurityType:
Hybrid Threat
Platform:
Mac OS X
Last updated:
02/09/16 9:14 pm
Threat Level:
High
Description
AgentBob is a hybrid keylogger and screen recorder program. It is sometimes presented as a parental monitoring tool, but like all software with keystroke logging and screen recording capabilities, it can be used to monitor the activity of any user of the computer on which it is installed.
AgentBob is designed to covertly record all keystrokes and save the data in text files, though it is unable, in most cases, to record text entered in password fields. AgentBob also takes screenshots of the system …
March 6, 2021 •
2 min read
SecurityType:
Keylogger
Platform:
Mac OS X
Last updated:
02/09/16 9:14 pm
Threat Level:
High
Description
AceSpy is a keylogger marketed as a parental monitoring tool, but like all keystroke logging software, it can be used to monitor the activities of any computer on which it is installed.
Designed to run undetected on the host computer, AceSpy creates detailed records of the system’s activities and forwards them to an email address controlled by whoever installed the program. In addition to logging keystrokes, AceSpy records web and search activity, email conversations, and social media interactions; it is also able to take screenshots …
March 6, 2021 •
2 min read
SecurityApple has three great checklists that we’re featuring on this week’s eposide: If you want to see if anyone else has access to your device or accounts, If you want to stop sharing with someone whom you previously shared with, and If you want to make sure no one else can see your location.
March 4, 2021 •
8 min read
Security
-
-
- Last updated:
- 02/23/21 2:29 pm
-
Description
Silver Sparrow is malware.
Silver Sparrow Threat Removal
MacScan can detect and remove Silver Sparrow malware from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
March 2, 2021 •
1 min read
Security
-
-
- Last updated:
- 03/01/21 4:13 pm
-
Description
Hoverwatch is a keylogger.
Hoverwatch Threat Removal
MacScan can detect and remove the Hoverwatch keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
March 1, 2021 •
1 min read
SecurityThis week on the Checklist, security researcher Patrick Wardle joins us to discuss the new Silver Sparrow malware variant.
February 25, 2021 •
6 min read
SecurityAre iMessage backups encrypted? The answer might surprise you! In this article, we’ll show you how to make secure, encrypted iMessage backups for your iPhone.
February 24, 2021 •
7 min read
SecurityApp developers are warning that there are lots of scam apps in the App Store — and they say that Apple’s own ratings and review system is a big part of the problem. In this article, we’ll take a look at what’s going on, and tell you how you can stay safe.
A broken ratings system
For the last couple of weeks, iOS app developer Kosta Eleftheriou has been calling out Apple on Twitter. He says there are tons of malicious and scam apps in the App Store — and other devs …
February 19, 2021 •
6 min read
SecurityThis week on The Checklist, we talk with award-winning educator Robert Speciale, whose innovative program is teaching cybersecurity to high school students
February 18, 2021 •
5 min read
SecurityA proposed North Dakota law could force Apple and Google to allow alternative app stores and payment systems on their platforms, potentially ending Apple’s tight control over iPhone apps and sparking major changes in the mobile app market.
February 16, 2021 •
6 min read
SecurityPrivacy Labels have landed in the App Store for a number of apps. We’ll cover what those are, what they cover, why some apps don’t have them, and what you can do with the information on them.
February 11, 2021 •
7 min read
SecurityLast week, someone breached the computer system of a water treatment plant in Florida. According to public officials, the hacker tampered with critical safety settings, making changes that could have released toxic chemicals into the water supply.
The Oldsmar water treatment plant hack
The incident occured in the city of Oldsmar, Florida, a small municipality (pop. 14,000) just outside of Tampa. According to a press release issued by the Pinellas County Sheriff’s Office, an unidentified hacker accessed the City of Oldsmar’s computer system twice on February 5.
The first intrusion was brief, and …
February 10, 2021 •
4 min read
SecurityValentine’s Day 2021 is right around the corner, and the FBI is telling people to be on the lookout for romance scams. In this article, we’ll tell you what romance scams are, how they work, and how you can avoid them.
What are romance scams?
Romance scams are a kind of social engineering. In a romance scam, the scammer pretends to be romantically interested in their victim in order to gain their affection and trust. They then use the relationship to ask for money or personal information. In some romance scams, an …
February 4, 2021 •
9 min read
SecurityWe’ll look at Apple’s App Tracking Transparency push, as well as its war of words with Facebook this week.
February 4, 2021 •
4 min read
SecurityA new iPhone is a ton of fun — but once you have your shiny new device up and running, you should also take a few minutes to configure it for security, privacy, and performance.
February 3, 2021 •
10 min read