Browsing tag

Mac

What to Do If Your Mac Keeps Freezing

A MacBook is the closest a personal computer gets to perfection. While Windows-based computers are notorious for being laggy and slow, MacBooks are the epitome of performance.  However, even a MacBook isn’t immune to underperformance and can slow down or start freezing up over time. In this article, we will explore the common reasons your […]

New Mac Malware Uses ‘Fileless’ Technique To Attack Stealthily

Notorious hacking group Lazarus which is also behind the widespread WannaCry ransomware is trying to infect Mac users with new malware that uses ‘fileless’ technique to hide from antivirus software. As highlighted by Patrick Wardle, a Mac security expert, this new malware deploys in-memory execution or fileless infection that involves malware not writing anything to […]

How To View Hidden Files On MacOS Using Simple Steps?

It’s not just you, we all want to know why the Mac system takes up so much of space. I am curious about it, however, it could be life and death for users who are about fill up their macOS disk storage. Now, there are several ways to approach the situation — You can use […]

Vulnerability in Zoom video conference app lets Mac’s camera hijacking

The vulnerability in the Zoom video conference app lets attackers hijack Mac’s camera by merely using malicious websites. The Zoom video conference app is currently being used by millions of users around the world and that makes it a lucrative target for cybercriminals. Jonathan Leitschuh, an IT security researcher has discovered a critical zero-day vulnerability […]

Hackers using pirated software to spread new cryptomining Mac malware

If you download pirated content from torrent platforms, you can be a victim of this Mac malware. There is a new variant of cryptomining malware that is specifically targeting Apple’s Mac devices and those users who prefer downloading pirated software from torrent platforms. Dubbed Bird Miner by researchers; this cryptocurrency mining malware is actually a […]

Bird Miner: This Cryptominer Malware Emulates Linux To Attack Macs

One of the biggest disadvantages of using pirated software is the increased risk of letting your computer get infected with malware. Cybercriminals often bundle the cracked versions of paid software on piracy websites with adware and cryptominer to earn free cash. So, if you’re installing such programs from unknown sources, the chances of you getting […]

Apple’s All New Mac Pro Supports Intel 28 Core Xeon CPU And 1.5TB RAM

After much wait and speculation, Apple has finally launched its most powerful Mac, the Mac Pro. The new ‘cheese grater’ look is here to replace the 2013’s ‘trash can’ Mac Pro, which wasn’t well-received by pro customers of the company. With the new Mac Pro, Apple has returned to the basics in a big manner. […]

Lynis 2.7.3 – Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made. There is a risk of breaking your existing configuration. Lynis is an open source security auditing tool. Used by system administrators, security […]

Apple To Ditch Intel Chips In Mac For Its ARM Chips In 2020: Report

Several reports have indicated that Apple is planning to ditch Intel in favor of its own ARM chips for macs in 2020. According to a report by Axios, many Intel officials are also expecting Apple’s move towards in-house ARM-based chips by next year. For smooth transition on the software side, Apple already has plans to merge iPhone, iPad and Mac […]

An info stealer .exe malware is targeting Mac users around the globe

Cybercriminals have identified a unique method of attacking Mac devices, which involves exploiting executable or .EXE files. Those files that can be executed both on Mac and Windows devices have the potential of infecting Mac computers as these unload a .exe malware. Discovered by Trend Micro researchers, the new malware can bypass the macOS security […]

Flaws in RDP protocols leaving machines prone to remote code execution

Major Security Flaws Identified in RDP Protocols making Machines Prone to Remote Code Execution and Reverse RDP Attacks. Check Point researchers have identified that three remote desktop protocol (RDP) tools, which are probably the most popular ones for Windows, macOS, and Linux systems, are plagued with not one or two but twenty-five CVE-listed security flaws. […]

Fwknop – Single Packet Authorization & Port Knocking

fwknop implements an authorization scheme known as Single Packet Authorization (SPA) for strong service concealment. SPA requires only a single packet which is encrypted, non-replayable, and authenticated via an HMAC in order to communicate desired access to a service that is hidden behind a firewall in a default-drop filtering stance. The main application of SPA […]

New Mac Malware steals iPhone text messages from iTunes backups

The IT security researchers at Palo Alto Networks’ Unit 42 have discovered a dangerous new Mac malware capable of targeting devices for multi-purposes including stealing cryptocurrency. Dubbed CookieMiner by researchers; the Mac malware is a variant of OSX.DarthMiner, another nasty piece of malware known for targeting MacOS. But, CookieMiner aims at much more than its predecessor. According to researchers, […]

Attackers successfully hide Mac malware in ad images

Malware campaigns have become quite regular on Apple devices and as per the new report from Confiant, a cyber-security firm, there’s a new group on the block called that is specifically targeting Apple users through malvertising. The group called VeryMal has employed steganography technique this time to prevent detection and hide the malicious code in […]

PA Toolkit – A Collection Of Traffic Analysis Plugins Focused On Security

PA Toolkit is a collection of traffic analysis plugins to extend the functionality of Wireshark from a micro-analysis tool and protocol dissector to the macro analyzer and threat hunter. PA Toolkit contains plugins (both dissectors and taps) covering various scenarios for multiple protocols, including: WiFi (WiFi network summary, Detecting beacon, deauth floods etc.) HTTP (Listing […]

Pocsuite v2.0.8 – Remote Vulnerability Testing Framework Developed By The Knownsec Security Team

Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec Security Team. It comes with a powerful proof-of-concept engine, many niche features for the ultimate penetration testers and security researchers. How to use Pocsuite with seebug PoC search and zoomeye dork Pocsuite with seebug PoC and zoomeye dork Pocsuite with […]

Aircrack-ng 1.5 – Complete Suite Of Tools To Assess WiFi Network Security

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools. Attacking: Replay attacks, deauthentication, fake access points and others via packet injection. Testing: Checking WiFi cards and driver […]