Security News



2016-08-22 16:57
Verifying a file’s cryptographic signature can help the user deduce its trustability. If you’re using OS X, there is no simple way to view a file’s signature from the UI, unless you’re using the...






2016-07-12 17:51
Mac OS firewall Little Snitch is vulnerable to local escalation of privileges attacks that could give criminals the ability plant rootkits and keylogger on some Mac OS X El Capitan systems.