Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
XCSSET, the sophisticated modular malware targeting Apple developers, is back with a new variant. While XCSSET has been operating in the wild since 2020, it is still unknown who is behind the malware...
Free online file converters have been around for decades, with users around the world using them to convert images, edit PDFs, and download videos. Naturally, uploading and downloading files on these sites has...
When checking for viruses, we naturally tend to focus on our computers and phones. But what about the network those devices use every day? Specifically, what about the router? How often do we...
Moonlock Lab threat researchers have come across a rather unique piece of macOS malware. The malware sample was found as a MachO file — the file format used by macOS systems to install...
For many people, their preferred internet browser has become a very personal and, hopefully, private space. It’s where emails are written, bank accounts are checked, and work is performed. So, when malware comes...
On March 10, X, the social media company led by Elon Musk, suffered an outage that affected thousands of users. The outage came into the spotlight after Musk himself said on X that...
Among the many good reasons to avoid cracked software, free software, and apps from unknown developers is the increased risk of malware. An example of this is AdLoad, a piece of trojan horse...
Unfortunately, browser hijackers are becoming an increasingly serious problem these days. Gaining control of your browser can be very financially beneficial for a hacker, especially considering the volume of information that passes through...
Viruses and malware have been around since the early days of technology. The intention of malware has always been to disrupt, steal, mislead, pressure, extort, spy, and cause damage. But what are the...
A backdoor is a type of malware that establishes a presence in a system and allows hackers to connect with the infected device. You can think of it as someone adding an extra...