Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
Information stealers, currently among the top most dangerous cybercriminal threats to Apple devices, are often distributed via malicious Google Ads that impersonate known brands. Now, leveraging the increasing popularity of the Arc web...
For the past few years, macOS malware has been on the rise, with information stealers, malvertising, phishing, and AI-driven attacks impacting Apple users. But not all attacks start with malware. As the software...
Open-source malware hosted on GitHub is free to use and free to copy. It can be modified and customized, and it can be distributed to anyone. But while some malware repositories (project files...
Few things are as scary and nerve-racking as getting an alert that says you have been hacked and your private data may be at risk. When you get these types of messages, your...
Apple’s new iOS 18, released at WWDC 2024, was met with positive first reactions by the international tech press and iPhone users. The new operating system, supercharged with AI, is Apple’s counter-offensive move...
For months, government officials in Paris have warned that an unprecedented wave of cyberattacks during the upcoming Olympic Games is expected. Now, with the 2024 Olympic Games in Paris rapidly approaching and scheduled to...
Artificial intelligence (AI) — or Apple Intelligence, as the company from Cupertino calls it — took front and center stage at the 2024 Apple Worldwide Developers Conference. At WWDC 2024, Apple focused on the...
To define whale phishing we must understand the phases of a whaling attack and how it works. In this case, it starts with a cybercriminal, or a group of them, searching for a...
It is widely accepted that the next couple of months will be critical for geopolitics. With landmark EU, UK, and US elections all happening this year, the days to come will not only...
With European elections about to begin on June 6 and rushed UK elections unexpectedly called by Prime Minister Rishi Sunak for July 4, countless warnings from cybersecurity experts are becoming reality. For months,...