Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
Apple ID security is extremely difficult to hack via malware. However, if criminals get hold of your Apple credentials, things can go wrong very fast. A recent report from Broadcom, the company that...
Three years after a debate on the security of AirPods was ignited by the media reporting that United States Vice President Kamala Harris was “Bluetooth-phobic,” the story has come full circle. The claims...
Information stealers, currently among the top most dangerous cybercriminal threats to Apple devices, are often distributed via malicious Google Ads that impersonate known brands. Now, leveraging the increasing popularity of the Arc web...
For the past few years, macOS malware has been on the rise, with information stealers, malvertising, phishing, and AI-driven attacks impacting Apple users. But not all attacks start with malware. As the software...
Open-source malware hosted on GitHub is free to use and free to copy. It can be modified and customized, and it can be distributed to anyone. But while some malware repositories (project files...
Few things are as scary and nerve-racking as getting an alert that says you have been hacked and your private data may be at risk. When you get these types of messages, your...
Apple’s new iOS 18, released at WWDC 2024, was met with positive first reactions by the international tech press and iPhone users. The new operating system, supercharged with AI, is Apple’s counter-offensive move...
For months, government officials in Paris have warned that an unprecedented wave of cyberattacks during the upcoming Olympic Games is expected. Now, with the 2024 Olympic Games in Paris rapidly approaching and scheduled to...
Artificial intelligence (AI) — or Apple Intelligence, as the company from Cupertino calls it — took front and center stage at the 2024 Apple Worldwide Developers Conference. At WWDC 2024, Apple focused on the...
To define whale phishing we must understand the phases of a whaling attack and how it works. In this case, it starts with a cybercriminal, or a group of them, searching for a...