SecurityThe holiday shopping season is almost here, and many of us are gearing up for the big sales that go with it. In particular, Black Friday and Cyber Monday are sure to be two of the busiest shopping days of 2019.
But bargain hunters aren’t the only ones looking forward to these retail extravaganzas: Hackers are already preparing to take advantage of unwary shoppers amidst all the craziness.
And unfortunately, far too many consumers will fall victim to scams, phishing attacks, and identity theft this year. This is not the way you …
November 26, 2019 •
8 min read
SecurityA a complete guide to how to keep yourself safe during the holiday travel season. We’ll tell you what to do before you even walk out the door, how to protect yourself while you’re traveling, and what things to bear in mind when you reach your destination.
November 21, 2019 •
12 min read
SecurityThe holidays mean lots of company in and out, and travel. Follow these simple 10 tips to harden your security and keep your privacy this holiday season.
November 19, 2019 •
7 min read
SecurityHoliday travel season is almost here. And while many of us will be staying with family, friends, or in hotels, a growing number of people are making use of Airbnb to find lodging during the holidays.
Airbnb rentals can be an excellent option for travellers: They’re cost-effective, conveniently located, and feel a bit more like home than the local Marriott! But staying in someone else’s space — as opposed to a large hotel chain — can also raise security and privacy concerns.
If you’re considering using Airbnb during this year’s holiday travel …
November 19, 2019 •
4 min read
SecurityOn this edition of The Checklist: Apple Mail Encryption, Now with Less Encryption!, Ransomware Revisited, and A Ring of Insecurity.
November 14, 2019 •
10 min read
SecurityPrivacy is hard to come by these days. Malicious actors, large corporations, and governments are constantly trying to look over your shoulder when you’re online.
But some in the tech community are fighting back. Tools like ad blockers, no-track browsers, and VPNs can help keep digital snoops in check.
One of the most important of these technologies is encrypted messaging, which is available through a number of third-party and native applications.
So how do these messengers work? Are they all the same? And the million dollar question: Are they truly secure? Here’s what …
November 13, 2019 •
8 min read
SecurityPatrick Wardle is a security researcher and software developer whose areas of expertise include macOS malware and nation-state threats.
Wardle is Principal Security Researcher at Jamf and creator of the Objective-See suite of security tools. He is also the founder of the world’s premier Mac security conference: Objective by the Sea.
We caught up with Patrick to talk about macOS security as well as the advanced threats being created by nation-state actors around the world.
CNN once called Patrick Wardle “a sweet guy” who could “hack …
November 12, 2019 •
24 min read
SecurityDigital forensic analysts are the Sherlocks of cybersecurity, gathering and interpreting evidence from digital sources for use in criminal or civil court cases. While the field of digital forensics is an interesting topic in its own right, it’s also worth learning about if you’re interested in digital privacy issues.
Understanding how digital forensic analysts work—and in particular, what they look for in their investigations—can teach you a lot about what’s going on behind the scenes on your computer. And once you know that, you can take steps to better protect your …
November 11, 2019 •
8 min read
SecurityOn this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out of a Hollywood thriller.
Here’s the Checklist for this week:
Taking the privacy out of VPNSIM-swapping 101An audio hack with a “light” touch
When VPNs go public
As many as 2,000 users of the popular VPN service Nord VPN may have had their accounts compromised in a credential stuffing attack.
Credential stuffing refers to the practice …
November 8, 2019 •
8 min read
SecurityHigh-profile ransomware attacks on city and state governments have made national and international news in the past year. Many people are left wondering how serious the problem is—and what, if anything, can be done about it.
November 7, 2019 •
4 min read
SecurityFree and fair elections are the cornerstone of any democracy. But in recent years, the integrity of the electoral process itself has been called into question.
People across the ideological spectrum are concerned about the political, technological, and social issues around voting: Foreign interference in elections, voter access issues, demonstrably insecure voting machines, and voter fraud. While we may disagree on the details, all of us want secure elections with reliable results.
Blockchain technology has been proposed as a solution to the challenges of modern voting—but many people are unsure about what …
November 5, 2019 •
6 min read
SecurityWe’ve talked about how cybersecurity affects enterprises and schools. But there’s another sector that is increasingly being targeted by cyberattacks: healthcare. The stakes are more than just financial—a cyberattack on a hospital or healthcare facility could literally become a matter of life and death.
In this article we’ll take a look at the state of cybersecurity in the healthcare sector, and detail the unique challenges faced by information security teams working to keep our hospitals safe.
The scope of the problem
The healthcare sector is vast. The US alone has over 6,000 hospitals …
November 4, 2019 •
7 min read
SecurityIn recent weeks, several high-profile US organizations have faced controversy due to their ties with China—and due to the actions which they took in order to preserve those ties.
November 3, 2019 •
5 min read
Securityalso known as BirdMiner
-
-
- Last updated:
- 07/01/19 7:43 pm
-
Description
Loudminer is malware that uses infected systems to mine cryptocurrency.
Loudminer Threat Removal
MacScan can detect and remove Loudminer Malware from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
November 1, 2019 •
1 min read
Security
-
-
- Last updated:
- 07/01/19 7:49 pm
-
Description
Siggen is malware that comes disguised as a copy of the popular WhatsApp chat program.
Siggen Threat Removal
MacScan can detect and remove Siggen Malware from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
November 1, 2019 •
1 min read
SecurityThis week on the Checklist, we’ll catch you up on what Apple has been doing to keep you safe. We’ll talk about some adware apps that got the boot from the App Store. And finally, we’ll look at the cybersecurity implications of Catholicism 2.0.
This week’s Checklist covers:
A look at the security bits of this week’s Apple updatesAdware violating apps kicked out of the App StoreDo rosary beads really need an app? Really?
To opt in, or to opt out, that is the question…
This week, Apple released a bevy of updates for …
November 1, 2019 •
10 min read
SecurityOn this edition of The Checklist: What to do if you lose the 2FA “thing you have, Privacy concerns behind the wheel, and Who’s who and why you should fear them.
October 24, 2019 •
9 min read
SecurityNancy Willard is an educator and lawyer who runs Embrace Civility in the Digital Age, an organization dedicated to creating a culture of civility and positivity online through empowering teens and the adults who care for them. She is the author of several books, including the first book ever published on the topic of cyberbullying, Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Cruelty, Threats, and Distress.
SecureMac caught up with Nancy to ask her about the state of cyberbullying today, and what parents and …
October 23, 2019 •
8 min read
SecurityThis week on the Checklist, we’ll look at a troubling connection between Apple and the Chinese government. We’ll revisit the issue of IoT security (spoiler: It’s not getting any safer out there). And we’ll round out the list with a reminder that when it comes to cybersecurity, sharing is caring!
This week’s Checklist is:
What Website Warnings and Tencent will get youSecurity and an Internet of Things thingAnd would you please join our street team? We offer benefits!
Apple’s silent partner
Last week MacRumors reported on a connection between Apple and Chinese tech giant …
October 18, 2019 •
8 min read
SecurityBig companies spend millions of dollars guarding against data breaches—and sometimes they still come up short.
So how can small businesses prevent data breaches? Can it even be done? Fortunately, the answer is yes—and there are a number of simple, cost-effective things smaller organizations can do to minimize their risk and keep their customers safe.
Several of the insights in this piece came from our conversation data breach expert Troy Hunt, creator of the “Have I Been Pwned” data breach aggregation service. If you’d like to learn even more about data breaches …
October 16, 2019 •
6 min read