In the wake of June 2018 Patch Tuesday, alerts and patches were issued for another speculative execution vulnerability affecting Intel, a git issue with Apple and a flaw in the BIND open-source DNS software.
The developers of third-party security products for Macs are issuing patches after researchers realized their software was not properly interacting with Apple's code-signing API. Without the patch, attackers can craft malicious files capable of bypassing the code-signing process, making it look like their code is legit software approved by Apple.
Apple's newest enhancements to its Safari browser will inhibit websites and apps -- including Facebook -- from using cookies and fingerprinting techniques to track users across the internet.
The biometric side of the cybersecurity equation is getting ready to put fingerprint readers in its rear-view mirror as newer technologies coming into the market prove more capable.
Another chink has developed in the usually tough Apple OS ability to ward off cybersecurity issues with a new cryptocurrency miner being discovered that is hitting macOS devices.
A recently discovered email phishing campaign was found targeting Apple ID credentials, while using AES encryption to thwart active countermeasures against their malicious website.
Multiple major operating systems and hypervisors contain a serious CPU chipset bug that could allow authenticated attackers to read sensitive data in memory and control certain low-level functions, prompting their developers to issue security updates patching this flaw.
Apple on Tuesday released security updates for the Safari browser and its MacOS and iOS operating systems, fixing a total of four vulnerabilities.
Apple addressed a bevy of security bugs late last week, after issuing updated versions of its current operating systems, Safari browser and other core products, as well as security enhancements for two older OS offerings.
Independent researchers collected $267,000 in bug purchases this week at the annual Pwn2Own contest at CanSecWest in Vancouver, after demonstrating vulnerability exploits in Apple (5 bugs), Microsoft (4), Oracle (2), and Mozilla software (1).
No, NSA whistleblower and U.S. fugitive Edward Snowden did not just purchase a 2 terabyte storage plan for iCloud, nor has he moved back to the States.
Apple found itself in damage control mode today after the source code, called iBoot, for the iPhone's operating system was somehow posted to Github potentially giving anyone the ability to spot vulnerabilities.
A cybercriminal managed to infiltrate the Mac app download site MacUpdate and install maliciously- copies of the Firefox, OnyX, and Deeper applications that actually were cryptocurrency miners.
A quirky bug in Apple's Messages application is allowing a malicious GitHub link to cause crashes and other bothersome behavior on both macOS and iOS machines.
An independent security researcher has done a quick analysis of a new Mac OS X DNS hijacker that is closely related to a previously uncovered Windows-only version that is capable of allowing man-in-the-middle attacks.
An independent security researcher that goes by the handle Siguza revealed a local privilege escalation Zero Day in macOS that can be exploited by any unprivileged user.
Apple has continued to roll out patches to fix the KRACK (Key Reinstallation AttaCKs) series of vulnerabilities, this time in its AirPort Base Station firmware.
Barely one week after the highly anticipated launch of Apple's new iPhone X, security researchers are claiming they were able to defeat its Face ID facial recognition security feature using a carefully crafted mask worth approximately $150.
Apple issued a supplemental security update for macOS High Sierra 10.13 to patch two issues one of which fixes a keychain
Apple's release of iOS 11 patched an out-of-bounds write vulnerability in Wi-Fi chips that, if exploited, could have allowed attackers within range to execute arbitrary code on the firmware.
Apple on Monday issued security updates for its iCloud for Windows, macOS High Sierra operating system, and macOS Server products, fixing 67 vulnerabilities.
Some Apple product owners have found themselves on the receiving end of a new ransom attack that has someone locking their device most likely using stolen iCloud credentials and the initiating the Find My iPhone remote lock feature.
WhatsApp added another layer of protection for users in late 2016, quietly introducing a new feature that encrypts messages and contacts when uploading this data to Apple's iCloud servers, according to a Forbes report.
The developers of HandBrake have advised Mac-based users that they may be infected with a backdoor after an unknown attacker replaced a HandBrake software installation package with a variant of the Proton RAT malware.