Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
Cybercriminals are using a new, surprisingly simple technique to bypass Apple’s SMS anti-phishing security feature. The new trick impersonates the way legitimate modern SMS bots used by governments and organizations around the world...
It was Homer who first introduced the term “trojan horse” into our vocabulary. The wooden horse that helped the Greeks invade the city of Troy has become a well-known legend around the world....
Banshee, a stealer that emerged in mid-2024 to target macOS users, has received an alarming update. The developers behind Banshee have “stolen” Apple’s XProtect encryption, giving the malware increased stealth and attack rate...
If you’re suddenly getting lots of pop-up ads appearing on your Mac screen, you likely have adware. This form of malware is becoming increasingly common and is, of course, extremely irritating to experience....
A battle to dominate the world of crypto wallet drainers has been unfolding on the dark web. Throughout 2024, a handful of cyber criminal gangs that offer crypto drainers and phishing-as-a-service have proliferated....
Hackers and malware developers are always changing their tactics to try to stay one step ahead of everyone else. Consequently, no file format can be considered 100% safe. If it isn’t dangerous now,...
A class action lawsuit that started more than 5 years ago seems to be coming to an end with Apple agreeing to pay $95 million for allegedly eavesdropping on its users. At the...
Contrary to popular belief, Macs do get viruses and other malware. Due to the way a Mac is constructed, the risk of that malware spreading is limited compared to the risk of it...
Despite what you may have heard, MacBooks can and do get viruses and malware. Admittedly, viruses on Macs are not as prevalent as on Windows, but they do happen. And if a virus...
Your web browser is the door to your internet activity, including what you search for and what you buy. Therefore, it’s highly worth the effort for a hacker to try to install a...