Protecting yourself from fraudulent EDR requests

Protecting yourself from fraudulent EDR requests

Cybercriminals are using fraudulent Emergency Data Requests (EDRs) to convince tech companies to give them sensitive user data. Read on for more information about the problem and some tips to help you stay safe.

April 14, 2022 • 11 min read
March 2022 Apple Updates

March 2022 Apple Updates

March 2022 Apple updates for macOS, iOS, iPadOS, watchOS, tvOS, and Apple software. Covers security highlights and discussion of impact.

March 15, 2022 • 4 min read
Mac Trojan Horse Malware Guide

Mac Trojan Horse Malware Guide

SecureMac’s guide to Mac Trojan horse malware, updated and expanded for 2022. Covers definition, capabilities, variants, and how to avoid.

March 14, 2022 • 10 min read
Checklist 270: Avoiding Tax Scams

Checklist 270: Avoiding Tax Scams

Tax scams 2022: the same thing all over again? We’ll explain why old scams still work, and revisit the classic scams you need to know about.

March 11, 2022 • 2 min read