Yet another strain of malware targeted at Mac users has popped up this week to prove you shouldn’t disable the Gatekeeper feature baked into OS X. “OSX/Keydnap” disguises itself as an innocent text or image file, then installs malicious code onto your Mac.
With Bendgate not that far behind us, is it really wise for Apple to contemplate an even thinner iPhone?
Sure, it’s an easy selling point for new iPhones, but thinner can also mean more bendable. Take a look at this age-old Apple theme in this week’s Cult of Mac Magazine, along with 10 fantastically useful mobile Safari tips, a way to find out if you’ve been infected by sneaky adware, five amazingly great new iOS games, and some awesome product reviews to help inform your purchasing plans.
In addition to various viruses that can harm your Mac, there’s a different kind of annoyance you might have stumbled upon: adware.
This might manifest itself as a web page that tells you you’ve been infected, with an accompanying phone number to call or malicious website to visit, or it might even show up as an ostensibly helpful Mac app you don’t remember installing.
If you’re experiencing the pain of malicious adware, we’re here to help. Here’s how to eliminate the adware that’s plaguing your Mac.
Apple is taking steps to avoid a repeat of this week’s serious XcodeGhost incident — in which hundreds of App Store apps were discovered to include malware in the form of a counterfeit version of Xcode, the platform used by developers to build their apps.
An Android app that promises free porn has been secretly snapping photos of its users as they enjoy its content. “Adult Player” then locks up the victim’s device and uses their photo in a ransom note demanding $500.
If you enjoy customizing your iPhone, jailbreaking can be a positive thing — although that doesn’t mean it comes without risks.
According to a new report, around 225,000 Apple accounts have been stolen by malware on jailbroken iPhones, in what is claimed to be “one of the largest known thefts of its kind.” In some cases, this data was then used to make unauthorized purchases.