Security News

Windows GravityRAT malware now also targets Android, macOS
2020-10-19 11:48

GravityRAT, a malware strain known for checking the CPU temperature of Windows computers to detect virtual machines or sandboxes, is now multi-platform spyware as it can now also be used to infect Android and macOS devices. While the malware authors previously focused their efforts on targeting Windows machines, a sample discovered by Kaspersky researchers last year shows that they are now adding macOS and Android support.

Apple Patches Four Vulnerabilities in macOS
2020-09-25 15:00

Apple on Thursday informed customers that it patched a total of four vulnerabilities across macOS Catalina, High Sierra and Mojave. Apple says exploitation of the flaw, which involves the processing of a malicious USD file, could lead to arbitrary code execution or a DoS condition.

macOS Adware Delivers Notarized Payloads
2020-09-02 16:59

A recently identified adware campaign targeting macOS users is leveraging malicious code that has received Apple's approval. The approval, or notarization, as Apple calls it, is an automated process through which software is scanned before reaching macOS users, to ensure that it does not include malicious code.

Apple-notarized malware foils macOS defenses
2020-09-01 11:37

Shlayer adware creators have found a way to get their malicious payload notarized by Apple, allowing it to bypass anti-malware checks performed by macOS before installing any software. The first known instance of notarized macOS malware was discovered last week, by a college student who noticed that people who want to download Homebrew and make the mistake of entering the wrong URL are getting served with a warning saying their Adobe Flash Player is out of date and offering an update for download. Security researcher Patrick Wardle analyzed the served package and confirmed that it is not an update, but a notarized version of the macOS Shlayer adware, which doesn't get detected as malicious by Gatekeeper.

Black Hat 2020: ‘Zero-Click’ MacOS Exploit Chain Uses Microsoft Office Macros
2020-08-06 13:02

A new "Zero-click" MacOS exploit chain could allow attackers to deliver malware to MacOS users using a Microsoft Office document with macros. The exploit chain, revealed by Patrick Wardle, principal security researcher with Jamf, at Black Hat USA 2020, runs macros without an alert or prompt from the Microsoft Office application that prompts explicit user approval - meaning that when a user opens the document, the macro is automatically executed.

Researcher Details Sophisticated macOS Attack via Office Document Macros
2020-08-05 18:12

A researcher found a way to deliver malware to macOS systems using a Microsoft Office document containing macro code. Macros enable Office users to automate frequent tasks using VBA code.

Acunetix now available on all major operating systems, including macOS
2020-07-19 23:30

Acunetix is now available on macOS. Customers can now harness the full power of Acunetix using their operating system of choice - Windows, Linux, macOS, or the cloud. Acunetix pioneered dynamic application security testing, was the first business-class web application security scanner on Linux, and is now the first on macOS as well.

This week of never-ending security updates continue. Now Apple emits dozens of fixes for iOS, macOS, etc
2020-07-16 21:08

Apple has released a fresh batch of software security updates for its flagship devices. For iOS and iPadOS the 13.6 update includes fixes for 29 CVE-listed vulnerabilities, 10 involving arbitrary code execution.

AweSun update supports macOS to accelerate the progress of building connections from anywhere
2020-07-13 01:00

AweRay, an international remote desktop service provider, released AweSun updated version which supports macOS in the US and worldwide. AweSun Remote Desktop enables people to connect to remote work computer, from home laptop, iPad or iPhone.

How to ensure the integrity of your encrypted drive while it's hibernating in macOS
2020-07-06 20:39

By default, macOS does not maintain integrity while hibernating. The problem is that while the key is stored in resident memory, it is unencrypted, allowing an attacker the opportunity to recover the non-obfuscated key using freely available tools to repeal FileVault's protections and gain unauthorized access to the now decrypted data stored on your device.