Results for

Checklist 167: Apple updates all of it

Checklist 167: Apple updates all of it

Cupertino rolled out new features and bug fixes for all of its operating systems, so we’re going to take a look at last week’s security news broken down by OS.

December 12, 2019 • 8 min read
New fileless malware for macOS linked to Lazarus Group

New fileless malware for macOS linked to Lazarus Group

The new malware sample bears similarities to the well-known AppleJeus malware, which targets cryptocurrency exchanges. AppleJeus is the product of Lazarus Group, a shadowy cybercrime organization believed by many to be linked to North Korea.

December 10, 2019 • 6 min read
Checklist 166: Warnings from the FUN Bureau

Checklist 166: Warnings from the FUN Bureau

On this week’s Checklist, we’ll look at some dumb ways to buy a smartwatch. We’ll share a PSA from the FBI. And we’ll talk politics and app security by way of FaceApp.

December 6, 2019 • 13 min read
Setting up a new Mac for security: 7 tips and tricks

Setting up a new Mac for security: 7 tips and tricks

So you’re the proud owner of a brand new Mac — wonderful!

You’re no doubt eager to try out all the bells and whistles; install your favorite apps; start using your new machine. We know the feeling.

But part of setting up a new macOS device should always be making sure it’s secure — and that’s what we’re going to cover in this quick setup guide. Follow these “Day 1” steps so you can enjoy your Mac with confidence in the weeks, months, and years to come.

article span.backnum { font-family:”Open Sans”, sans-serif; …

December 3, 2019 • 10 min read
Checklist 165: Safe shopping for the holidays

Checklist 165: Safe shopping for the holidays

This week’s Checklist gets you ready for the seasonal shopping rush (from a cybersecurity perspective, anyway). We’ll show you how to keep safe as you shop online; what gifts you might want to avoid; and how to make sure everything arrives as planned; and what to do when all the madness is over! 

This week’s Checklist covers:

How to shopWhat (not) to buyDeliveries and checkups

Shop smart, shop safe

Before you actually purchase anything online, there are a couple of basic precautions you should take — and one or two seasonal threats you need …

November 29, 2019 • 11 min read
10 ways to avoid Black Friday and Cyber Monday scams in 2019

10 ways to avoid Black Friday and Cyber Monday scams in 2019

The holiday shopping season is almost here, and many of us are gearing up for the big sales that go with it. In particular, Black Friday and Cyber Monday are sure to be two of the busiest shopping days of 2019.

But bargain hunters aren’t the only ones looking forward to these retail extravaganzas: Hackers are already preparing to take advantage of unwary shoppers amidst all the craziness.

And unfortunately, far too many consumers will fall victim to scams, phishing attacks, and identity theft this year. This is not the way you …

November 26, 2019 • 8 min read
Checklist 164: Over the River and Through the Woods

Checklist 164: Over the River and Through the Woods

A a complete guide to how to keep yourself safe during the holiday travel season. We’ll tell you what to do before you even walk out the door, how to protect yourself while you’re traveling, and what things to bear in mind when you reach your destination.

November 21, 2019 • 12 min read
5 Airbnb security and privacy tips

5 Airbnb security and privacy tips

Holiday travel season is almost here. And while many of us will be staying with family, friends, or in hotels, a growing number of people are making use of Airbnb to find lodging during the holidays.

Airbnb rentals can be an excellent option for travellers: They’re cost-effective, conveniently located, and feel a bit more like home than the local Marriott! But staying in someone else’s space — as opposed to a large hotel chain — can also raise security and privacy concerns.

If you’re considering using Airbnb during this year’s holiday travel …

November 19, 2019 • 4 min read
Encrypted messaging apps: Everything you need to know

Encrypted messaging apps: Everything you need to know

Privacy is hard to come by these days. Malicious actors, large corporations, and governments are constantly trying to look over your shoulder when you’re online.

But some in the tech community are fighting back. Tools like ad blockers, no-track browsers, and VPNs can help keep digital snoops in check. 

One of the most important of these technologies is encrypted messaging, which is available through a number of third-party and native applications.

So how do these messengers work? Are they all the same? And the million dollar question: Are they truly secure? Here’s what …

November 13, 2019 • 8 min read
The SecureMac Interview: Security Researcher Patrick Wardle talks nation-state malware and the future of macOS

The SecureMac Interview: Security Researcher Patrick Wardle talks nation-state malware and the future of macOS

Patrick Wardle is a security researcher and software developer whose areas of expertise include macOS malware and nation-state threats.

Wardle is Principal Security Researcher at Jamf and creator of the Objective-See suite of security tools. He is also the founder of the world’s premier Mac security conference: Objective by the Sea.

We caught up with Patrick to talk about macOS security as well as the advanced threats being created by nation-state actors around the world.

CNN once called Patrick Wardle “a sweet guy” who could “hack …

November 12, 2019 • 24 min read
Digital forensics and privacy: 3 things to know

Digital forensics and privacy: 3 things to know

Digital forensic analysts are the Sherlocks of cybersecurity, gathering and interpreting evidence from digital sources for use in criminal or civil court cases. While the field of digital forensics is an interesting topic in its own right, it’s also worth learning about if you’re interested in digital privacy issues. 

Understanding how digital forensic analysts work—and in particular, what they look for in their investigations—can teach you a lot about what’s going on behind the scenes on your computer. And once you know that, you can take steps to better protect your …

November 11, 2019 • 8 min read
Checklist 162: Insecurity with a “light” touch

Checklist 162: Insecurity with a “light” touch

On this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out of a Hollywood thriller.

Here’s the Checklist for this week:

Taking the privacy out of VPNSIM-swapping 101An audio hack with a “light” touch

When VPNs go public

As many as 2,000 users of the popular VPN service Nord VPN may have had their accounts compromised in a credential stuffing attack.

Credential stuffing refers to the practice …

November 8, 2019 • 8 min read
7 Facts About Ransomware Attacks on Local Government

7 Facts About Ransomware Attacks on Local Government

High-profile ransomware attacks on city and state governments have made national and international news in the past year. Many people are left wondering how serious the problem is—and what, if anything, can be done about it.

November 7, 2019 • 4 min read
5 Things to Know About Blockchain Voting

5 Things to Know About Blockchain Voting

Free and fair elections are the cornerstone of any democracy. But in recent years, the integrity of the electoral process itself has been called into question.

People across the ideological spectrum are concerned about the political, technological, and social issues around voting: Foreign interference in elections, voter access issues, demonstrably insecure voting machines, and voter fraud. While we may disagree on the details, all of us want secure elections with reliable results.

Blockchain technology has been proposed as a solution to the challenges of modern voting—but many people are unsure about what …

November 5, 2019 • 6 min read
Cybersecurity and healthcare: When infosec is a matter of life and death

Cybersecurity and healthcare: When infosec is a matter of life and death

We’ve talked about how cybersecurity affects enterprises and schools. But there’s another sector that is increasingly being targeted by cyberattacks: healthcare. The stakes are more than just financial—a cyberattack on a hospital or healthcare facility could literally become a matter of life and death.

In this article we’ll take a look at the state of cybersecurity in the healthcare sector, and detail the unique challenges faced by information security teams working to keep our hospitals safe.

The scope of the problem

The healthcare sector is vast. The US alone has over 6,000 hospitals …

November 4, 2019 • 7 min read
Apple’s China Problem

Apple’s China Problem

In recent weeks, several high-profile US organizations have faced controversy due to their ties with China—and due to the actions which they took in order to preserve those ties.

November 3, 2019 • 5 min read
Loudminer

Loudminer

also known as BirdMiner

    • Type:
    • Malware
    • Platform:
    • Mac OS X
    • Last updated:
    • 07/01/19 7:43 pm
    • Threat Level:
    • High

Description

Loudminer is malware that uses infected systems to mine cryptocurrency.

Loudminer Threat Removal

MacScan can detect and remove Loudminer Malware from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.

Download MacScan

November 1, 2019 • 1 min read