Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
Researchers have figured out a way to bypass a key security framework that macOS and iOS use to secure what data and systems an app can control. The vulnerability lies within the Shortcuts app,...
From AI-driven deepfakes interfering in the US election to a new iOS trojan that steals biometric data from iPhone users to the Hong Kong deepfake scandal that cost a multinational $26 million, AI-driven...
Cooperating international law enforcement agencies are stepping up their game in the fight against cybercriminal gangs. Recently, the United States DOJ and the FBI, working with the United Kingdom National Crime Agency’s (NCA)...
The GoldFactory gang, a group of cybercriminals known for their banking malware targeting Android devices, has created a trojan targeting iOS users. Once this malware breaches iPhone devices, it can steal biometric data,...
Mac malware is on the rise, and the trend is only accelerating. A new Bitdefender investigation has uncovered a new backdoor that has been operating undetected for the past 3 months in macOS...
Chances are that if you worked in accounting or finance and received a call from your boss asking you to make a transfer, you most likely would do it, especially if he asked...
Tricking victims into downloading malware is a major component of a cybercriminal’s job. To do this, they employ a wide range of techniques that experts call vectors of attack. Popular vectors include buying...
The much-anticipated new iPhone feature, Stolen Device Protection, is finally here. With it, Apple makes it extra difficult for thieves to access your stolen iPhone. As good news as this may sound, tech...
Jamf Threat Labs has reported that they’ve discovered a new malware campaign using pirated applications as the attack vector. Cracked versions of applications, popular among Mac users, are being hosted by a Chinese...
If you’ve ever wondered how cyberattacks begin, the answer is usually through stolen credentials, data, and passwords dumped on the dark web and forums. From phishing to spear phishing, credential stuffing, account takeovers,...