A MacBook is the closest a personal computer gets to perfection. While Windows-based computers are notorious for being laggy and slow, MacBooks...
Notorious hacking group Lazarus which is also behind the widespread WannaCry ransomware is trying to infect Mac users with new malware that...
It’s not just you, we all want to know why the Mac system takes up so much of space. I am curious...
The vulnerability in the Zoom video conference app lets attackers hijack Mac’s camera by merely using malicious websites. The Zoom video conference...
If you download pirated content from torrent platforms, you can be a victim of this Mac malware. There is a new variant...
One of the biggest disadvantages of using pirated software is the increased risk of letting your computer get infected with malware. Cybercriminals...
After much wait and speculation, Apple has finally launched its most powerful Mac, the Mac Pro. The new ‘cheese grater’ look is...
Researchers discovered a new wave of sophisticated banking malware called Retefe that targeting Windows and Mac users financial data by routing the...
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of...
Cheat Engine is an open source tool designed to help you with modifying single player games running under window so you can...
Several reports have indicated that Apple is planning to ditch Intel in favor of its own ARM chips for macs in 2020. According to...
Cybercriminals have identified a unique method of attacking Mac devices, which involves exploiting executable or .EXE files. Those files that can be...
Major Security Flaws Identified in RDP Protocols making Machines Prone to Remote Code Execution and Reverse RDP Attacks. Check Point researchers have...
fwknop implements an authorization scheme known as Single Packet Authorization (SPA) for strong service concealment. SPA requires only a single packet which...
The IT security researchers at Palo Alto Networks’ Unit 42 have discovered a dangerous new Mac malware capable of targeting devices for multi-purposes...
Malware campaigns have become quite regular on Apple devices and as per the new report from Confiant, a cyber-security firm, there’s a...
Shodan is a search engine on the internet where you can find interesting things all over the world. For example, we can...
PA Toolkit is a collection of traffic analysis plugins to extend the functionality of Wireshark from a micro-analysis tool and protocol dissector...
Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec Security Team. It comes with a powerful...
Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities. Idea for this script comes from...
Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet...