The long-awaited iOS 18 is finally here. With a plethora of new features, integration of AI, updates, and redesigns, Apple officially presented iOS 18 during the “Glowtime” event, along with the new iPhone...
The arrest of Pavel Durov, the founder and CEO of Telegram, has shaken up the tech community. The charges against Durov include refusal to cooperate with authorities and complicity in offenses related to...
While macOS Sequoia has been around for developers since June 10, the official and final release is expected to roll out in the fall (September or October). From Apple Intelligence to the new...
In a recent Mobile Guardian security incident, thousands of students in Singapore, North America, and Europe had their iPhones and iPads remotely wiped. Mobile Guardian is a UK-based company that provides student device...
As high-profile ransomware and state-sponsored cyberattacks take center stage in the global threat landscape, another type of threat is flying under the radar and on the rise: insider threats. Using sophisticated social engineering...
When KnowBe4 hired its latest Principal Software Engineer, things didn’t turn out exactly as planned. The company had checked all the right boxes. They posted the job, received CVs, did interviews and background...
For the second time in 2024, Apple has issued a new threat notification alert to iPhone users across 98 countries. The warning is clear. Apple said those contacted are specifically being targeted “for...
Artificial intelligence has skyrocketed to become the most advanced technology of our time. But for most users, it’s a mysterious black box — the inner workings remain unseen. We type in a prompt,...
Three years after a debate on the security of AirPods was ignited by the media reporting that United States Vice President Kamala Harris was “Bluetooth-phobic,” the story has come full circle. The claims...
For the past few years, macOS malware has been on the rise, with information stealers, malvertising, phishing, and AI-driven attacks impacting Apple users. But not all attacks start with malware. As the software...