Category: The Mac Security Blog

Top 12 New Features in iOS 17 and iPadOS 17

Here are 12 of the best new features that you’ll be able to try out on your iPhone or iPad in the fall. The post Top 12 New Features in iOS 17 and iPadOS 17 appeared first on The Mac…

Top 10 New Features in macOS Sonoma

*Here are 10 of the best features in macOS Sonoma that you’ll be able to try out in the fall.* The post Top 10 New Features in macOS Sonoma appeared first on The Mac Security Blog. This article has been…

When does an old iPhone become unsafe to use?

When Apple stops issuing security updates for older iPhones, they become unsafe to use. But exactly how long can you safely keep using an old iPhone? The post When does an old iPhone become unsafe to use? appeared first on…

Use Apple HomeKit to automate and secure your home

Apple’s HomeKit lets you manage and control smart home devices, like light bulbs, plugs, climate control, security devices, and more. The post Use Apple HomeKit to automate and secure your home appeared first on The Mac Security Blog. This article…

Atomic Stealer: Thieving Mac malware sold via Telegram

Atomic Stealer, a new “malware as a service” framework, can exfiltrate sensitive data from Macs, including passwords, stay-logged-in session cookies, cryptocurrency wallets, and more. The post Atomic Stealer: Thieving Mac malware sold via Telegram appeared first on The Mac Security…

Apple issues first Rapid Security Response for macOS, iOS

On Monday, May 1, Apple released its first-ever Rapid Security Response updates for macOS Ventura, iOS 16, and iPadOS 16. Here is everything you need to know to stay safe. The post Apple issues first Rapid Security Response for macOS,…

Chromium vulnerabilities threaten Electron app security

Chromium vulnerabilities can impact Electron desktop apps—such as Skype, Slack, and WhatsApp—and you may not even know you are at risk. Here is everything users and developers need to know. The post Chromium vulnerabilities threaten Electron app security appeared first…

Urgent: 2nd Chrome zero-day vulnerability patched in 5 days

For the second time in five days Google Chrome and other Chromium-based browsers require an urgent security update to address a zero-day vulnerability that has been actively exploited in the wild. Here is everything you need to know to stay…

Juice Jacking, Best Buy Phishing, and Garage Doors Redux

The FBI warns people not to use public charging stations; we warned about this five years ago. An interesting phishing attack leverages QuickBooks accounting software to send fake invoices to people. And what does a company do if its smart…

What are Passkeys, and how do they work?

Passkeys may replace passwords in the relatively near future. Learn what passkeys are and how you can use them on your Mac, iPhone, and iPad. The post What are Passkeys, and how do they work? appeared first on The Mac…

FBI shuts down 11-year-old NetWire RAT malware

After nearly 11 years, law enforcement has finally shut down the distribution of NetWire RAT malware and arrested its alleged developer. NetWire Remote Control is also known as Netweird, NetWeirdRC, and Wirenet. The post FBI shuts down 11-year-old NetWire RAT…

Phishing Hackers Defeat 2FA via Man-in-the-Middle Attacks

Apple has finally stopped selling the Apple Watch Series 3, which can no longer get security updates. The FBI shuts down 11-year old malware. And a $300 hacking tool enables phishers to defeat two-factor authentication using automated man-in-the-middle attacks. The…

Cryptojacking Mac malware “Honkbox” found in pirated apps

Honkbox, a cryptojacking Mac malware family, has been distributed via Trojanized software found on The Pirate Bay. Here is everything you need to know to protect yourself from this threat. The post Cryptojacking Mac malware “Honkbox” found in pirated apps…

ScamBots and ScAmazon – Intego Mac Podcast Episode 282

ChatGPT is helping scammers create phishing emails that don’t sound phony, and Amazon sells plenty of items that are scams. Scammers are using AI-generated voices to scam elderly people, and the EU wants messaging apps – including Apple’s iMessage –…

What does your Mac do when it’s sleeping?

Your Mac does a lot when it is asleep. Find out what it does in the background, and what this means for your security and your battery life. The post What does your Mac do when it’s sleeping? appeared first…

The Complete Guide to Apple Watch Bands

It’s easy to change Apple Watch bands to suit your style. Here’s an overview of the different types of bands Apple sells. The post The Complete Guide to Apple Watch Bands appeared first on The Mac Security Blog. This article…

How to Turn On Advanced Data Protection for iCloud

If you want end-to-end encryption for all your iCloud data, it’s easy to turn on Advanced Data Protection. Here’s how. The post How to Turn On Advanced Data Protection for iCloud appeared first on The Mac Security Blog. This article…

How to Set Up Two-Factor Authentication on Twitter

Twitter is turning off SMS-based two-factor authentication next month. Here’s how to use a more secure form of 2FA. The post How to Set Up Two-Factor Authentication on Twitter appeared first on The Mac Security Blog. This article has been…

ChatGPT is malware makers’ new A.I. partner in crime

Over the past two months, we’ve seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial intelligence (AI) can potentially be used to create, modify, obfuscate, or otherwise enhance malware. It…

12 Ways to Open Files on a Mac

You open files every time you work on a Mac, and there are many ways to do this. Here are a dozen ways you can open files on a Mac. The post 12 Ways to Open Files on a Mac…

ChatGPT & AI Risks – Intego Mac Podcast Episode 278

AI has reached an inflection point; we discuss ChatGPT and other AI tools and their potential security and privacy risks. We also have an ears-on report about the new HomePod; it sounds better than expected. The post ChatGPT & AI…

Everything you can do with the Apple HomePod

The HomePod does a lot more than play music. Learn how to set it up, and how to use it with Siri to perform a number of useful tasks. The post Everything you can do with the Apple HomePod appeared…

Apple’s 2023 Mac mini is a Mini Mac Studio

Apple’s new M2 Mac mini offers a wide range of configuration options. The post Apple’s 2023 Mac mini is a Mini Mac Studio appeared first on The Mac Security Blog. This article has been indexed from The Mac Security Blog…

Apple releases macOS Ventura 13.2, iOS 16.3, and more

Apple released OS updates this week, fixing vulnerabilities and adding features in macOS Ventura 13.2, iOS and iPadOS 16.3, and more. The post Apple releases macOS Ventura 13.2, iOS 16.3, and more appeared first on The Mac Security Blog. This…

The top 20 most notable Mac malware threats of 2022

We recently compiled our list of the top Apple security and privacy stories of 2022. Now we turn our focus specifically to the Mac malware threats of the past year. Here are all of the top malware threats that made…

20 Top Apple Malware Threats in 2022

We recently compiled our list of the top Apple security and privacy stories of 2022. Now we turn our focus specifically to the Mac malware threats of the past year. Here are all of the top malware threats that made…

LastPass password manager suffers massive data breach

LastPass suffered a massive data breach in August, and new details have gradually come to light. Is it time to switch password managers? (Spoiler: Yes, it is.) The post LastPass password manager suffers massive data breach appeared first on The…

Apple’s Safari Web Browser is 20 Years Old

20 years ago, Steve Jobs introduced the “turbo browser for Mac OS X.” The post Apple’s Safari Web Browser is 20 Years Old appeared first on The Mac Security Blog. This article has been indexed from The Mac Security Blog…

Apple Security and Privacy in 2022: The Year in Review

There was no shortage of Apple security and privacy news in 2022. Let us take a trip down memory lane and rediscover some pivotal moments in the privacy and security of the Mac and other products in the Apple ecosystem.…