Tuesday, March 31, 2020

LightSpy: APT malware for iOS

Security researchers have discovered a new form of iOS malware that they’ve dubbed LightSpy affecting both iOS and Android. The post LightSpy: APT malware for iOS appeared first on SecureMac.

A Checklist of Checklists Around Covid-19

The Checklist is taking a break this week, but with all that’s going on in the world, and with so many new changes to the way we live and work, we wanted to point you to some resources that...

Apple’s March 2020 Updates

Apple has just released a raft of updates, and some of them have important security and privacy implications. In this brief article, we’ll highlight some of the key points from Cupertino’s release notes and explain their significance. Then (in...

Avoiding Covid-19 Financial Relief Scams

In a bid to blunt the economic fallout from the Covid-19 pandemic, U.S. lawmakers have proposed a program of direct relief payments to citizens. The first payments are expected sometime in April 2020, though the specifics are still undetermined....

Checklist 178: Another Coronavirus Checklist

The world is changing so fast that it can be hard to keep up. This week on the Checklist, we’ll take a look at how life is going to be different in the weeks and months ahead — and...

SecureMac Releases MacScan 3.3

Cybersecurity firm SecureMac has released the latest version of its macOS malware detection and removal tool: MacScan 3.3. The post SecureMac Releases MacScan 3.3 appeared first on SecureMac.

Objective by the Sea 3.0

The world’s only Mac and iOS security conference returned home to Maui last week, with some of the best minds in Apple security research coming together for a few days of learning, training, information sharing, and tool demos. The conference...

What Is SIM Swapping?

SIM swapping is a serious cybersecurity threat — and it’s on the rise, affecting everyone from ordinary people to tech titans like Twitter CEO Jack Dorsey. In this short piece, we’ll explain what SIM swapping is, how it works,...

Checklist 177: The Coronavirus Checklist

This Checklist is all about Covid-19, the severe new form of coronavirus which has recently reached pandemic status. We’ll cover several safety issues related to the virus — both digital and physical The post Checklist 177: The Coronavirus Checklist appeared...

Sarah Edwards on digital forensic analysis

Sarah Edwards is a digital forensic analyst whose area of specialization is Mac and iOS forensics. She works as a Senior Digital Forensics Researcher for BlackBag Technologies, and is also a teacher, holding the position of Principal Instructor at...

Are Adware and PUPs Really Harmless?

Mac malware is largely made up of adware and Potentially Unwanted Programs (PUPs) — and these are often regarded as nuisances rather than true dangers. The post Are Adware and PUPs Really Harmless? appeared first on SecureMac.

11 Ways to Make Remote Work Safer

As the Covid-19 virus continues to spread, more companies will consider remote work as a way to keep their teams healthy and safe. But for many businesses, this will be their first experiment with remote work at scale —...

Checklist 176: Cloudiness Around Clearview AI

Checklist 176 is all about privacy, security, and the little startup that may have stolen your face. The post Checklist 176: Cloudiness Around Clearview AI appeared first on SecureMac.

What is Stalkerware?

We’ll tell you everything you need to know in order to understand what stalkerware is and how to avoid it. The post What is Stalkerware? appeared first on SecureMac.

Security researcher Phil Stokes on the state of Mac malware

Phil Stokes is a malware researcher and technical writer for SentinelOne, an emerging powerhouse in the world of enterprise cybersecurity. He is also an independent app developer who has created several macOS troubleshooting tools. In March, he will present...

Palantir, The $20 Billion, Peter Thiel-Backed Big Data Giant, Is Providing A Coronavirus Monitoring Tool To The CDC

Palantir will help the Centers for Disease Control keep on top of ventilator and mask needs to treat coronavirus victims, sources say.

Defense Evasion Dominated 2019 Attack Tactics

Researchers mapped tactics and techniques to the MITRE ATT&CK framework to determine which were most popular last year.

Watering-Holes Target Asian Ethnic Victims with Flash Update Decoy

About 10 compromised websites employ a multi-stage, targeted effort to fingerprint and compromise victims.

OpenWRT is vulnerable to attacks that execute malicious code

Enlarge (credit: OpenWRT) For almost three years, OpenWRT—the open source operating system that powers home routers and other types of embedded systems—has been vulnerable to remote code-execution attacks because updates were delivered over an unencrypted channel and digital...
SC Magazine

Privacy in critical care after telehealth demands jump

As coughs and body aches drive anxious Americans to telemed services in record numbers, relieving the burden on medical facilities stressed to breaking with COVID-19 cases, the subsequent relaxation of privacy requirements puts them at risk of PHI compromises,...