Results for

SecureMac Kicks Off Digital Spring Cleaning Season with PrivacyScan 1.9.3 Release

SecureMac Kicks Off Digital Spring Cleaning Season with PrivacyScan 1.9.3 Release

Las Vegas, Nevada, April 6, 2017 — Spring is here, and that means spring cleaning for many. To aid users in controlling their digital footprint and managing disk space, SecureMac has announced its newest update to PrivacyScan with version 1.9.3. This update to the award-winning application, designed to safeguard user privacy, delivers priority bug fixes along with several other improvements. User interface refinements yield simple and efficient operation easy for both beginners and advanced users. PrivacyScan 1.9.3 also provides enhanced cleaning for Google Chrome users, securely and efficiently removing private …

April 6, 2017 • 3 min read
Competing Hackers Discover Method for Hijacking the Touch Bar

Competing Hackers Discover Method for Hijacking the Touch Bar

When Apple revealed its long-awaited refresh of the MacBook line last year, the Touch Bar was touted as a major selling point. By incorporating the same sensor technology already present in the iPhone, Apple said that a wide variety of new applications were available. From rapid online purchasing to using your fingerprint to unlock your Mac, it attracted plenty of attention. Apple even discussed its efforts to secure the Touch Bar, since protecting user biometric information and payment data is of obvious importance.

However, a recent hack of …

March 30, 2017 • 2 min read
Checklist 30: What Happens When “The Cloud” Goes Bad

Checklist 30: What Happens When “The Cloud” Goes Bad

As helpful as the convenience of storing data in “the Cloud” can be, there are lots of examples of problems with cloud services causing disruption for individuals and for businesses. What happens when “the Cloud” goes bad? That’s our topic for this edition of The Checklist. We’ll look at problems you might encounter when using iCloud, as well as some of the broader issues with cloud computing in general.

March 30, 2017 • 10 min read
Recent Google Issues Present Some Mac Users with Pop-Up Password Prompt

Recent Google Issues Present Some Mac Users with Pop-Up Password Prompt

No one likes to contend with pop-up windows, no matter what the context. Once a mainstay of advertising on the web, pop-ups today mostly remain only on less refined websites. Many users also associate pop-up windows with malware infection — and that isn’t a wrong association to have, either. Often, malware will present you with a dialogue box that resembles a genuine system prompt. However, it could then lead you into installing more malicious software or exposing your personal information. However, it’s not always a sign that something is …

March 23, 2017 • 2 min read
Checklist 29: Encrypted Chat Apps for Secure Messaging on iOS

Checklist 29: Encrypted Chat Apps for Secure Messaging on iOS

Encryption is big news today for security professionals and regular users as well. As more and more people are concerning themselves with keeping their communication secret, a large number of encrypted messaging apps are hitting the scene. How do you pick one? And what do you need to know about them?

March 23, 2017 • 11 min read
Allegedly “Undetectable” Malware Offered for Hefty Darknet Price Tag

Allegedly “Undetectable” Malware Offered for Hefty Darknet Price Tag

Though many of its now-famous hidden marketplaces have been taken down by law enforcement, the darknet continues to be a home for the web’s seediest characters. The latest item to hit the market and generate buzz isn’t an illegal substance — instead, it’s illegal software. Several outlets have reported that an anonymous darknet user is currently making attempts to sell an allegedly unreleased “remote administration tool,” or RAT, for Macs.

Dubbed “Proton,” when installed this software gives attackers full control over a user’s machine. That includes downloading more …

March 22, 2017 • 2 min read
Apple Reassures Users: Flaws in WikiLeaks/CIA Vault7 Leak Already Patched

Apple Reassures Users: Flaws in WikiLeaks/CIA Vault7 Leak Already Patched

On March 7th, WikiLeaks entered the news and made waves again by releasing almost nine thousand documents they claimed came from within the US Central Intelligence Agency. Contained in the leak was a vast range of information about the CIA’s intelligence gathering practices regarding technology. The revelations included information that the agency had undertaken spying efforts through exploiting vulnerabilities in various technologies, including some “smart” TVs and mobile operating systems. Also, contained within the documents, however, were fourteen previously undisclosed flaws in iOS. Through these flaws, an attacker could …

March 21, 2017 • 2 min read
SecureMac Releases PrivacyScan 1.9.2 to Enhance User Privacy

SecureMac Releases PrivacyScan 1.9.2 to Enhance User Privacy

Las Vegas, Nevada, 20 March 2017 — SecureMac has announced the release of PrivacyScan 1.9.2, the latest version of its award-winning software designed to protect user privacy. The incremental update provides a more refined user experience while also addressing minor bugs. PrivacyScan 1.9.2 adds support to clean additional Firefox and Safari data locations, ensuring removal of personal information left behind after browsing the web. Meanwhile, users can enjoy interface refinements and ease-of-use improvements for even easier operation. 

What PrivacyScan does for users

PrivacyScan plays a dual role: freeing up valuable disk …

March 20, 2017 • 2 min read
Google Discloses Major Vulnerability in ESET Mac Antivirus Software

Google Discloses Major Vulnerability in ESET Mac Antivirus Software

If there is one type of software a user should have the ability to trust, it’s legitimate antivirus programs. As a tool designed to protect from malware attacks, every antivirus effort requires careful, thoughtful design and an absolute focus on the safety and security of the end user’s system. Unfortunately, that is not always the case. In one of the most egregious examples of a major flaw in an antivirus product for Macs, Google disclosed a vulnerability in ESET Endpoint Antivirus. Through this wide-open security hole, hackers could have …

March 18, 2017 • 3 min read
Checklist 28: Five Malware Distribution Methods and How to Protect Against Them

Checklist 28: Five Malware Distribution Methods and How to Protect Against Them

When you know where malware is most likely to be found and how it’s most likely to attack, you can take steps to avoid it. From email attachments to hacked websites, malware lurks in a number of places. On today’s episode, we’ll look at how malware is distributed: the means, the methods, and the most effective ways to mitigate the risks.

March 16, 2017 • 11 min read
Internet-Enabled Children’s Toys Expose Data for Hundreds of Thousands of Users

Internet-Enabled Children’s Toys Expose Data for Hundreds of Thousands of Users

Internet-Enabled Children’s Toys Expose Data for Hundreds of Thousands of Users

Have you heard of the “Internet of Things”? A relatively newer term, this phrase refers to far more than just Internet-connected thermostats and Wi-Fi-enabled refrigerators. Companies now build network functionality even into children’s toys. As we know from the problems caused by the Mirai malware & botnet, many Internet of Things (IoT) devices feature serious security flaws. Recently, the intersection of toys with these security flaws resulted in the exposure of a staggering amount of user information.

March 10, 2017 • 3 min read

Checklist 27: Steps to take when you suspect a malware infection

Checklist 27: Steps to take when you suspect a malware infection

When you suspect your Mac is infected, it’s important to take steps to find and fix the problem before the issue becomes severe — or worse, before your personal information is stolen. On today’s episode, we’ll look at the process you should follow if you think your Mac is suffering from a malware infection.

March 9, 2017 • 9 min read
Checklist 26: Recent Upswing in Mac Malware Activity

Checklist 26: Recent Upswing in Mac Malware Activity

The last few months of 2016 were kind of quiet in terms of sightings of new Mac malware, but maybe that was just the calm before the storm. 2017 has already seen a plethora of newly discovered malware targeting the Mac. On today’s Checklist we’re covering five recent Mac malware threats and a bonus item: How to minimize those threats.

March 2, 2017 • 12 min read
New macOS Ransomware Patcher aka FileCoder

New macOS Ransomware Patcher aka FileCoder

Since last year’s emergence of KeRanger, the first functional ransomware for macOS, it seemed only a matter of time before more threats of that type appeared. Security researchers recently found the newest attempt at ransomware for the Mac out in the wild. Masquerading as a “cracker” to bypass copy protection on software e.g. Microsoft Office for Mac or Adobe Premiere, the attackers have simply uploaded the disguised payload to several torrent sites. The researchers noted that though they only encountered two variants, more may still exist or be released.

March 1, 2017 • 3 min read

Checklist 25: 5 Things to Know About Child-Proofing Your Mac

Checklist 25: 5 Things to Know About Child-Proofing Your Mac

The internet is an important fixture in our lives, but definitely comes with some potential paths to hazards and threats, especially for kids. So what can you do to keep your kids safe? If you’re using a Mac – or if your child is, Apple includes a lot of tools in macOS that can help out. Today on The Checklist, we’ll look at five of the most important things to know about built-in parental controls on your Mac and how to use them effectively.

February 23, 2017 • 8 min read
Iranian Malware Targets User Passwords in the macOS Keychain

Iranian Malware Targets User Passwords in the macOS Keychain

A brand-new type of malware affecting Macs is in the wild, and this time there are definite signs of development in conjunction with a foreign nation. Designed (albeit rather poorly) to look like a Flash update, this malware, dubbed MacDownloader, is a unsophisticaed attempt to glean user passwords. Uncovered by security researchers after the malware targeted major defense contractors, the program may feature amateurish code, but its threat is very real.

After fooling a user into downloading the false Flash update, the malware quickly goes to work profiling the …

February 17, 2017 • 2 min read
Checklist 24: 5 Things to Know About Child-Proofing Your Kid’s iPhone

Checklist 24: 5 Things to Know About Child-Proofing Your Kid’s iPhone

Just about everyone has a smartphone these days, and many parents see the benefits in providing their children with a phone to keep in touch, or in case of an emergency. Smartphone also make it easier for children to be exposed to cyberbullying or inappropriate content, so how do you keep a child safe on the phone? We’re going to explore this topic more in depth on today’s episode!

February 16, 2017 • 9 min read
Security Certificate Flaw in Some iOS Apps Could Expose User Data

Security Certificate Flaw in Some iOS Apps Could Expose User Data

How often do you check the permissions you grant to apps installed on your iPhone? Do you ever enter sensitive information into apps, like emails, passwords, and more? With apps of every type and nature available on smartphones, it’s all too easy to supply these apps with critical data without a second thought. However, a recent find by a security firm CEO reveals that there are a substantial number of apps with a fundamental flaw that could expose this private information to an attacker. How does it work?

The …

February 16, 2017 • 3 min read
Safari Syncing Bug Left User Browsing Histories Accessible Through iCloud

Safari Syncing Bug Left User Browsing Histories Accessible Through iCloud

Regularly clearing the history of sites one has visited in a browser is a common habit for many users. It reduces digital clutter while also providing you with a degree of control over your privacy on the web. When you’ve cleared your history, no one can access your device and instantly see where you’ve been online. That’s the idea, at least; unfortunately, an issue within iCloud meant that user histories lingered in the cloud, sometimes including data over a year old. Though wiped from the devices, a well-informed individual …

February 14, 2017 • 2 min read