Security researchers have discovered a mysterious strain of malware that allows hackers to take over the webcam, keyboard, and other resources on your Mac.
The malware is believed to be at least five years old, but it has gone unnoticed until now.
Security researchers have discovered a mysterious strain of malware that allows hackers to take over the webcam, keyboard, and other resources on your Mac.
The malware is believed to be at least five years old, but it has gone unnoticed until now.
After spreading viruses among Windows PCs for years, malicious Microsoft Word documents are now infecting Macs.
The files contain a macro that silently executes in the background and downloads an application that can monitor webcams, steal passwords, read browser history and more.
Security researchers discovered a new way to hack the Mac’s built-in webcam this week, and the method is undetectable by users.
Apple built a green LED light into every Mac with firmware-level protection that turns on anytime the sensor is tripped by unauthorized access. The security feature has become increasingly difficult for hackers to beat, but former NSA staffer Patrick Wardle found a way to piggyback on outgoing feeds and record them.
Is your Mac infected by newly discovered malware that was ostensibly created by Milan-based HackingTeam in order to gain remote access to your machine?
The new virus uses some old HackingTeam code and some new tricks to hide its tracks, but it’s mostly harmless, according to researchers.
That doesn’t mean it’s not a good idea to get it off your system. Here’s how.
Apple’s Gatekeeper feature was designed to keep even the most advanced users from accidentally installing malicious software on their computers, but a super-simple exploit lets hackers sneak malware onto your Mac.
The exploit was discovered by Patrick Wardle, director of research at security firm Synack. Wardle found that the exploit is made possible thanks to a key design shortcoming in Gatekeeper that lets an attacker use a binary file already trusted by Apple to execute malicious files.
Here’s how it works: