Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
It turns out that when you click on that little button on your iPhone allowing an app to access your Contacts list or other data, what happens next is incredibly complex. Those who...
A transnational criminal syndicate or a malware-as-a-service group has taken the Atomic macOS Stealer to the next level. In what may very well be a historic first, threat actors are using blockchain smart...
A North Korean group of hackers linked to the country’s military cyber warfare units has updated the OtterCookie malware. This modular stealer, now in its fourth version, can breach Windows, macOS, and Linux...
Botnets have been around since the early days of the internet and remain one of the world’s most threatening cybersecurity issues. A cyber botnet has only one basic requirement: an internet connection. Once...
There are many types of malware out there, but one of the most destructive types can self-duplicate and jump from network to network. Highly favoured by cybercriminals, this malware can be extremely difficult...
As the post-pandemic world continues to adopt remote and hybrid work models, employers are seeking ways to keep an eye on their staff when they aren’t physically present in the office. This can...
It’s no secret that high-level iPhone users, such as journalists, human rights activists, government opposition, and other groups, are targeted with spyware like Pegasus. From time to time, Apple sends out notifications to...
Remember when the FBI warned us not to charge our phones in airports, shopping malls, and public spaces? We haven’t heard much about this type of cyberattack for some time now, but “juice...
So you downloaded some software, and now every time you open your web browser, it redirects you to trovi.com. Not only that, but now, your browser is constantly throwing ads at you. The...
Malware is an ever-increasing threat to users on Mac and Windows ecosystems alike. Understanding the many varieties of cyberattacks can seem daunting, but when it comes to macro viruses and macro malware, you...