Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
Some cyberattacks are simple to understand, with the motives behind them usually being financial or nation-state driven. However, other malicious attacks are more tricky to unravel. Security researchers recently identified one such attack...
While macOS Sequoia has been around for developers since June 10, the official and final release is expected to roll out in the fall (September or October). From Apple Intelligence to the new...
A dangerous new piece of malware targeting macOS devices has been discovered, posing a significant threat to Apple users. Cybercriminals are increasingly focusing their attention on Apple’s operating system, and this latest development...
In a recent Mobile Guardian security incident, thousands of students in Singapore, North America, and Europe had their iPhones and iPads remotely wiped. Mobile Guardian is a UK-based company that provides student device...
In what seems to be a wide-net style phishing campaign, hackers likely linked to China are impersonating the Security Service of Ukraine. Reports say this malicious email campaign is designed to target Ukrainian...
An iPhone is a powerful mini-computer capable of running your life from your pocket. So, like your Mac laptop, your iPhone internet browser needs cookies enabled in order to run at peak performance....
Passwords are usually your first line of defense against hackers and scammers, so it’s important to change password on iPhone every now and then. This will ensure that even attackers who know your...
Google has built some strong security features into Gmail, like two-factor authentification and encryption, making it difficult for cybercriminals to pull off a Gmail password hack. However, not all users activate 2FAs, and...
Privacy has become a core concern for users around the world. Websites that track and sell your personal data, malware, and financial data theft risks are some of the main concerns shared by...
Cons and scams are far older than the internet. And while such schemes have increased in the digital age, most are simply variations of old tricks that criminals use to steal, damage, spy,...