Users can be lured to a malicious site through a vulnerability in Apple AirTag
Security researcher Bobby Rauch discovered a vulnerability in AirTag key fobs, which…
Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card
Scientists talked about how to make fraudulent payments using Apple Pay with…
Criminals threaten to leak new Apple logo, if the company doesn’t pay the ransom
Last week it became known that the operators of the ransomware REvil…
REvil operators are blackmailing Apple
Media reported that REvil ransomware operators are blackmailing Apple and demand a…
Discovery of XSS vulnerability on iCloud website brought expert $5,000
Vishal Bharad, an Indian bug hunter and pentester, explained in a blog…
Vulnerability in WebKit engine could redirect iOS and macOS users to scam sites
Confiant experts report that malicious ads have been abusing a zero-day vulnerability…
Researcher compromised 35 companies through new “dependency confusion” attack
Information security expert Alex Birsan spoke about a new attack called “dependency…
Apple, Google, Microsoft and Mozilla block MitM certificate of the Kazakhstan government
In early December, Kazakhstan authorities for the third time attempted to intercept…
New Internet Protocol ODoH will hide websites visited by users from ISPs
Engineers at Cloudflare and Apple have created a new internet protocol, ODoH,…
Linus Torvalds doubts that Linux will run on Apple M1
Recently on the Real World Technologies forum Linus Torvalds was asked what…
Attackers again deceived Apple’s notarization process
In September 2020, I talked about how the Shlayer malware successfully passed…
Shlayer malware bypassed Apple security checks
Security expert Peter Dantini discovered that the Shlayer malware bypassed Apple's checks:…