Skip to main content

Security

See All Stories

Mac malware posing as apps like Loom, LedgerLive, and Black Desert Online

Mac malware posing as Loom and other apps | Google ad shown

A “sophisticated and alarming” Mac malware attack is being carried out in the guise of free versions of popular apps like the screen recording utility Loom, cryptocurrency manager LedgerLive, and MMO game Black Desert Online.

It appears to be a well-organized attack, with the fake Mac app offers promoted through a combination of legitimate-looking Google ads and phishing emails …

Expand Expanding Close

Security Bite: North Korean hackers impersonate job recruiters to target Mac users with updated BeaverTail malware

apple security release page

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


Security researchers have identified an attempt by state-sponsored hackers from North Korea (DPRK) to target Mac users with infostealer malware through a trojanized meeting app.

Once infected, the malware would establish a connection between the Mac and the attacker’s command and control (C2) server to exfiltrate sensitive data like iCloud Keychain credentials. It was also found to quietly install the remote desktop application AnyDesk and keylogging software in the background to take over machines and collect keystrokes.

Expand Expanding Close

CrowdStrike aftermath: Microsoft claims it cannot legally implement the same protections as Apple

CrowdStrike aftermath – Macs unaffected | Happy Mac icon

The CrowdStrike aftermath is seeing IT teams around the world struggle to restore the 8.5 million Windows PCs taken out by the bug. The mess included thousands of flights cancelled, health centers unable to make appointments, retailer payment terminals down, and even some 911 services unavailable.

Macs weren’t affected thanks to protections put in place by Apple, but Microsoft has reportedly claimed that antitrust law means it’s unable to take the same approach …

Expand Expanding Close

Global IT outage takes down airlines, banks, 911 services, more; CrowdStrike to blame

Global IT outage caused by CrowdStrike | Screengrab of crashed Windows PC

A huge mistake by cybersecurity company CrowdStrike has caused a global IT outage on a massive scale, with airlines, banks, health services, and more affected – including some 911 centers.

United, Delta, and American Airlines are among the airlines who have been forced to ground flights. Broadcaster Sky News was taken off-air for several hours. Many retailers have been unable to accept payments. In short, it’s chaos out there …

Expand Expanding Close

Cellebrite can’t unlock most iPhones running iOS 17.4 and later

Cellebrite can't unlock iPhones running iOS 17.4 and later | One of the company's devices

Leaked documents reveal that Cellebrite can’t unlock iPhones running iOS 17.4 and later, at least as of the date of publication (April 2024). The company has confirmed that the documents are genuine.

Cellebrite devices, which are widely used by law enforcement agencies, can crack most Android phones, though there are exceptions …

Expand Expanding Close

FBI accessed locked phone of Trump shooter in just two days [U]

FBI accessed locked phone of Trump shooter | Stock FBI photo

A statement reveals that the FBI accessed the locked phone of Thomas Matthew Crooks, the shooter at the Trump rally. There were unconfirmed reports that the device was an iPhone, but it was subsequently revealed to be a Samsung device.

The FBI said on Sunday that attempts to access the phone had not been successful, but just one day later stated that it has now succeeded …

Expand Expanding Close

AT&T hack: Carrier paid ransom for data; delayed public disclosure at request of FBI

AT&T hack | Conceptual image of Bitcoin

More details are coming to light about the AT&T hack, which saw the personal data of around 110M customers compromised – including records of who they called and texted.

It’s reported that the carrier made a Bitcoin ransom payment in return for the hacker deleting the data, and that public disclosure of the security breach was delayed for two months in response to a request from the FBI

Expand Expanding Close

Massive AT&T data breach sees hackers steal personal data of almost all customers

Massive AT&T data breach | 3D logo

A massive AT&T data breach has seen hackers able to steal the personal data of almost every customer the company has – a total of some 110 million Americans.

In an incredible security fail, the stolen data includes not only customer phone numbers, but also records of who contacted whom – a potential privacy minefield …

Expand Expanding Close

Apple warns iPhone users in 98 countries about ‘mercenary spyware attacks’

Apple warns of mercenary spyware attacks | Low-key photo of iPhone

Apple has warned a significant number of iPhone users across 98 countries that they appear to have been targeted by “mercenary spyware attacks” which could compromise almost all the personal data on their devices.

The company says it can never be 100% certain in its conclusions, but has a high degree of confidence that it is correct, and urges message recipients to take the security warning seriously …

Expand Expanding Close

Apple shares how to protect your Apple ID, avoid phishing, social engineering, and other scams

How to protect Apple ID account avoid phishing scams

Scams like phishing and social engineering are continuing to grow with some specifically targeting Apple users. With that in mind, Apple has shared a new support document with official tips on how to protect your Apple ID and other online accounts, how to spot and report scam emails, calls, and more.

Expand Expanding Close

Microsoft staff in China must use iPhone for authentication, not Android phones

Microsoft staff in China must use iPhone | Authenticator app seen here on an Android phone

Microsoft staff in China have been told that they must use an iPhone for authentication when logging in to company systems. From September, the use of Android smartphones as multi-factor authentication devices will be banned.

This will create a situation where an Apple device will be required despite the fact that staff are using Windows PCs …

Expand Expanding Close

Security Bite: Mac Malware wreaking the most havoc in 2024

apple security release page

It is a long-standing misconception that Macs are impervious to malware. This has never been the case. And while Apple might secretly hope people continue the preconceived notion, Mac users continue to be caught off guard by cybercriminals whose attack methods are becoming increasingly sophisticated. Below, you’ll find the most common macOS malware strains in 2024…


9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


Expand Expanding Close

Apple Intelligence privacy sets a new standard, but it’s not perfect – Inrupt

Apple Intelligence privacy isn't perfect thanks to ChatGPT integration | ChatGPT voice interface shown

Apple Intelligence privacy is stronger than that of any other AI company, but even its security protections aren’t perfect once ChatGPT gets involved.

That’s the argument made by the security chief at Inrupt, the privacy-focused company co-founded by the inventor of the world wide web, Tim Berners-Lee …

Expand Expanding Close

Identity verification company AU10TIX – used by tech giants – left photo IDs exposed

Identity verification company AU10TIX exposed photo ID | Sample driver's license shown

If there’s one type of company you definitely don’t want to see left vulnerable to hackers it’s an identity verification service with access to photo ID documents like driver’s licenses – but that’s exactly what appears to have happened with AU10TIX.

The cybersecurity company’s past or present clients include PayPal, Coinbase, X, TikTok, Uber, LinkedIn, Upwork, and Fiverr …

Expand Expanding Close

Vision Pro bug fixed; websites can no longer fill your room with bats

Vision Pro bug fixed | Bat seen on tabletop

Apple has fixed a Vision Pro bug which would have allowed a website to fill your room with an unlimited number of virtual 3D objects. Those objects – flying bats in the proof of concept – would then persist even after you quit Safari.

The bug was discovered by a cybersecurity researcher who says Apple took a lot of care to protect against this type of exploit, but it forgot one thing …

Expand Expanding Close

Europe and Australia both back down on CSAM scanning that would break encryption

Governments back down on CSAM scanning | Close-up photo of eye

Both the EU and Australia have backed down on separate proposals to force tech companies to carry out CSAM scanning within messaging apps, which would have meant breaking end-to-end encryption.

It’s the latest development in the ongoing battle between tech companies and politicians who don’t understand how encryption works

Expand Expanding Close

Manage push notifications

notification icon
We would like to show you notifications for the latest news and updates.
notification icon
You are subscribed to notifications
notification icon
We would like to show you notifications for the latest news and updates.
notification icon
You are subscribed to notifications