• The AI-Powered Wearable Tech Ecosystem That Feels More Like a Companion Than a Gadget
    www.yankodesign.com
    Artificial intelligence has gone beyond being a novel concept and has become an indispensable part of our lives. Recognizing this, LAYER unveils PiA, a visionary digital-first ecosystem of hardware that redefines how we engage with AI. Rather than just a set of smart devices, PiA offers a seamless extension of the user, combining advanced biometric sensing, contextual intelligence, and elegant design to create an intuitive and immersive AI experience.PiA consists of three key components: a smartphone, a biometric earbud, and a wearable camera module that detaches from the phone. These devices work in harmony to collect and analyze biometric and environmental data, providing users with contextually relevant advice and personalized feedback. Unlike traditional AI tools, PiA transforms artificial intelligence into a trusted companion that enhances daily life.Designer:LAYERTaking inspiration from nature, LAYER has meticulously designed PiA with tactile materials such as recycled glass, ensuring both sustainability and aesthetic appeal. The elegant, jewelry-like finishes make these devices feel more like personal accessories rather than conventional tech gadgets, seamlessly blending into users lifestyles.PiAs intelligence is defined by its ability to see, sense, listen, and communicate with the user and their surroundings. The biometric earbud goes beyond simply delivering sound and features sensors placed on the pulse point of the inner ear, tracking vital health metrics such as body temperature, heart rate, and overall biometric information. This data is then processed by the AI assistant, offering personalized health and wellness recommendations through the smartphone.The wearable camera module further enhances PiAs capabilities by providing visual input to the AI assistant. Designed to detach from the smartphone, it can be worn as a pin or brooch, allowing it to see what the user sees. This enables functionalities such as product identification, historical landscape insights, and real-time contextual awareness. While its convenience is impressive, concerns regarding its attachment strength and durability remain, whether it will securely stay in place or pose a storage challenge due to its protruding design.Completing the ecosystem is the ultra-slim and lightweight smartphone, crafted from recycled glass. It serves as the central hub for PiAs intelligent devices, processing and displaying insights gathered from the earbud and camera module. The smartphone operates with or without the camera and battery modules connected, offering flexibility in usability. It also boasts an edge-to-edge display for an immersive viewing experience.Beyond basic communication, PiAs smartphone introduces AI-enhanced applications, such as sleep improvement recommendations, personalized activity coaching, and real-life video footage overlaid on navigation maps. It even assists with booking hotels, flights, and events based on learned user preferences.Currently, PiA remains a concept, but its potential to revolutionize AI integration into everyday life is undeniable. LAYER has partnered with Complete Fabrication, a leading UK-based prototyping and model-making firm, to bring this vision closer to reality. While details on the first prototype remain undisclosed, the concept hints at a future where AI seamlessly interacts with us, not just as a tool but as a true personal companion.The post The AI-Powered Wearable Tech Ecosystem That Feels More Like a Companion Than a Gadget first appeared on Yanko Design.
    0 Comments ·0 Shares ·30 Views
  • 0 Comments ·0 Shares ·27 Views
  • 0 Comments ·0 Shares ·29 Views
  • The 8 Best Fans for Every Use, Editor Tested & Reviewed (2025)
    www.wired.com
    From tower and pedestal styles to utilitarian box fans, these are our WIRED-tested favorites.
    0 Comments ·0 Shares ·29 Views
  • How to Responsibly Dispose of Your Electronics (2025)
    www.wired.com
    Get rid of old, broken, and unused deviceseven Lightning cableswithout adding to the e-waste problem.
    0 Comments ·0 Shares ·30 Views
  • NASA Gave Up a Ride to the Moon. This Startups Rover Took It.
    www.nytimes.com
    After the space agency canceled its VIPER rover, an empty space was available on a private spacecraft that will still head to the lunar surface.
    0 Comments ·0 Shares ·30 Views
  • Complete list of Mac viruses, malware and trojans
    www.macworld.com
    MacworldDespite Apples best efforts, Mac malware does exist, we describe some cases below. However, before you panic, Mac malware and viruses are very rarely found in the wild. From time to time you will hear of big profile trojans, malware, and ransomware that is targeting the Windows world, very rarely is this a threat to Macs. For example, the worldwide WannaCry/WannaCrypt ransomware attack that hit back in May 2017 was only targeting Windows machines and therefore no threat to Macs.Luckily Apple has various measures in place to guard against such threats. For example, macOS shouldnt allow the installation of third-party software unless its from the App Store or identified developers. You can check these settings in System Settings > Privacy & Security and scroll to the Security section, or, if you are using Monterey or older, go to System Preferences > Security & Privacy > General. You can specify whether only apps from the Mac App Store can be installed, or if you are happy to allow apps from identified developers too. If you were to install something from an unknown developer Apple would warn you to check its authenticity.In addition, Apple has its own built-in anti-malware tool. Apple has all the malware definitions in its XProtect file which sits on your Mac, and every time you download a new application it checks that none of those definitions are present. This is part of Apples Gatekeeper software that blocks apps created by malware developers and verifies that apps havent been tampered with. For more information read: How Apple protects you from malware.We also discuss whether Macs need antivirus software separately.While its safe to say that Macs are safer than Windows machines, Macs are not completely safe from attacks. Even Apples Craig Federighi has admitted there is a problem, saying in May 2021 that: We have a level of malware on the Mac that we dont find acceptable. To stay safe, we recommend you read our best Mac security tips and our round-up of the best Mac antivirus apps, in which we highlight Intego as our top pick.Another thing to note is that Apples own M-series chips that it has been using in Macs since November 2020 are considered more secure than Intel processors. However, malware, dubbed Silver Sparrow, was found on the M1 Mac soon after launch so even Apples own chips are not immune.Curious to know what Mac viruses are out there, perhaps because you were thinking you might spy some suspicious processes or malware names in Activity Monitor on your Mac? In this article, we will endeavor to give you a complete list. PROMOTIONAntivirus Deal: Intego Mac Premium BundleGet Integos Mac Premium Bundle X9 with antivirus, firewall, backup and system performance tools for just $29.99 (down from $84.99) for the first year. Get DealCan Macs get viruses?Before we run through the malware thats been spotted on Macs we need to address this question. The word virus gets used a lot more than it should be a more accurate word would be malware. A computer virus is so-called because it is capable of replicating itself and spreading. A virus is only one type of malware of which there are many, and unfortunately there have been cases on the Mac.Malware includes the following:Adware: Once this malicious software is installed on a Mac it will show advertisements and pop-ups for software most likely for Potentially Unwanted Programs like those we will discuss next. According to Malwarebytes: macOS built-in security systems have not cracked down on adware and PUPs to the same degree that they have malware, leaving the door open for these borderline programs to infiltrate.Cryptocurrency miners: Criminals have attempted to use Macs to mine bitcoin and the like as in the case of LoudMiner (aka Bird Miner).macOS Stealers: This is a increasingly common kind of malware which Malwarebyteshighlighted in its 2025 State of Malware report and security expert Patrick Wardle has written about in his Mac Malware of 2024 round up. macOS Stealers, or Info Stealers are a kind of malware that is designed to find information such as authentication cookies, credit card numbers, passwords, and more. One example of this is Atomic Stealer, which has been used in several attacks. Phishing: Weve all received phishing emails and we all know the dangers, but as criminals get more sophisticated (and maybe even learn to spell) can we be sure we wont fall for a phishing attempt to gain our data or login details? You may think that you will never fall for a phishing attempt, but could you be as confident about your parents?Potentially Unwanted Programs (or PUPs): Famous examples include Advanced Mac Cleaner, Mac Adware Remover, and Mac Space Reviver. These apps tend to hound users, which is part of their downfall, as due to the bad reputations of some of these apps the number of Macs affected has fallen, according to Malwarebytes. So it seems that people are at least wising up to these dodgy programs.Ransomware: Ransomware has been detected on Macs but the Mac has never faced any widespread ransomware threats. To date, ransomware on the Mac users hasnt been ready for prime time, as Patrick Waddle puts it, but we should still be concerned. Spyware: Our data is incredibly valuable to criminals and spyware is designed to obtain this information. One example of this would be the Pegasus spyware that was known to have infected some iPhones. This was enough of an issue for Apple to announce that they will warn users of spyware attacks like Pegasus (more on that below).Trojan Horse: A Trojan is a kind of malware that is hidden, or disguised in software. There are various kinds of Trojans. A Trojan could, for example, give hackers access to our computers via a backdoor so that they can access files and steal your data. Essentially the name Trojan describes the method by which the malware gets onto your computer.USB/Thunderbolt hack: There have also been cases where malware has been installed on Macs via a modified USB cable. There have even been security flaws associated with Thunderbolt which are discussed in this article: How to protect your Mac from the Thunderbolt security flaw. Also read: Can Macs be hacked? Its clear from these cases that there is a threat from malware on the Mac, and there are likely to be more cases in the future. Even the M1 Macs were targeted shortly after they were introduced in November 2020: the Silver Sparrow malware targeted both M1 Macs and Macs that use Intel processors.One good thing is that Adobe ended support for Adobe Flash on 31 December 2020. At least this should reduce the number of cases of Mac malware disguised as the Flash Player arriving on the Mac.Mac malware in 2024Before you get to worried, many of these attacks are not going to relate to you, unless you live in China, North Korea, or have a lot of money tied up in cryptocurrency. But they do emphasise the growing numbers of malware targeting Macs. Patrick Wardle has published information about all the malware mentioned here.Unnamed Downloader When: December 2024. This one was discovered by the Moonlock Lab. Its not signed so it shouldnt run on macOS.HiddenRisk When: November 2024. More North Korean malware, this one is used in cryptocurrency attacks.RustyAttr When: November 2024. macOS downloader using a novel way to hide malicious shell scripts. Linked to North Korea.DPRK DownladerWhen: November 2024. macOS downloader built using Flutter (the open source software development kit from Google) and discovered by Jamf Threat Labs. VShell Downloader When: October 2024. A fake Cloudflare authenticator from China. InletDriftWhen: October 2024. This macOS downloader was used in the Radiant Capital hack which lead to the theft of $50 million digital coins and was linked to North Korea. CthulhuWhen: August 2024. A macOS stealer that can steal credentials relating to cryptocurrency wallet and games.ToDoSwift When: August 2024. A macOS downloader that is disguised as a PDF. Its a Swift-based malware and is linked to North Korea. BeaverTailWhen: July 2024. This macOS stealer targets users via a trojanized meeting app and is used by North Korean hackers to steal data and deploy additional payloads. BansheeWhen: July 2024. Another macOS stealers that targets cryptocurrency wallets was identified in July 2024. The Banshee Mac malware that attackers use to gain access to web browser data, such as login information and browser history. A new version known as Banshee Stealer arrived in January 2025 and this had encryption that allowed it to sneak past Apples XProtect. Read: New Mac malware can bypass Apples XProtect security scanner.Poseidon (aka Rodrigo)When: May 2024. Another macOS stealers that targets cryptocurrency wallets. Discovered by researchers at MacPaws Moonlock Lab.CloudChatWhen: April 2024. This is a macOS stealers that targets cryptocurrency wallets and keys. Known to monitor the clipboard.SnowLightWhen: April 2024. Another macOS downloader linked to China.LightSpyWhen April 2024: This exploit thought to come from China targets macOS, but also iOS, Android and Windows. It can exfiltrate browsing history, SMS messages and more and is used for espionage. (April 2024)HZ Rat Another backdoor targeting users in China. This one gives attackers complete control over the infected macOS device.It originated as a Windows malware.EvasivePanda When: March 2024. Discovered by ESET this macOS downloader targeted Tibetans and was linked to China.Activator When: February 2024. This is a downloader that installs a backdoor and crypto-stealer. Discovered by Kaspersky. RustDoor (aka ThiefBucket)When: February 2024. macOS backdoor with possible ties to a Windows ransomware group. Identified by Bitdefender.PyStealerWhen: February 2024. A macOS stealers that targets cryptocurrency wallets. Discovered by MacPaws Moonlock Lab.NotLockBitRamsonware that encrypts victims files while also implementing some basic stealer functionality. Discovered by TrendMicro.SpectralBlurWhen: January 2024. North Korean backdoor that could perform basic functions such as download, upload and execute capabilities.ZuruWhen: January 2024. Jamf discovered this backdoor malware disguised as popular macOS apps in January 2024. It was thought that it may be a new version of malware from 2021. Distributed through pirated software hosted in China. More here: Jamf discovers new malware disguised as popular macOS apps.Mac malware in 2023Downfall vulnerabilityWhen: August 2023. What: While not malware, this is a serious vulnerability affecting Intel processors, so if you have an Intel-based Mac from 2015 or later (or the iMac released in late 2015), your CPU is almost certainly affected by Downfall, a vulnerability that can exploit a flaw in the AVX vector extensions of every Intel CPU. It is likely that Apple will push out a macOS update to update the processor microcode. M-series Macs are unaffected. Read more here: Are Macs affected by that scary Intel Downfall vulnerability?Exploit HVNCWhen: August 2023: What: New malware that can be used by hackers to remotely gain control of an insecure Mac. The malware uses HVNC (Hidden Virtual Network Computing) to gain access to and remotely control a Mac, without the target user being aware. Reported by Security firm Guards. More here: New malware can give a hacker control of your Mac.ShadowVaultWhen: July 2023. What: ShadowVault can grab usernames and password, credit card info, data from cypto wallets, and more. Reported by Security firm Guards. More here: New ShadowVault macOS malware steals passwords, crypto, credit card dataJokerSpy When: June 2023. An attacker can gain control of the system and, via a backdoor, can run further exploits, monitor users behavior, steal login credentials or cryptocurrency wallets, according to Intego. Atomic macOS Stealer (AMOS)When: April 2023. What: targets macOS and steals important, private information, such as keychain and macOS user account passwords, system information, and files on the Desktop and Documents folder. AMOS is spread through unsigned disk image files (.dmg). Reported by Cyble Research and Intelligence Labs (CRIL). More here: New AMOS Mac malware targets passwords, personal files, crypto wallets.RustBucketWhen: April 2023. What: An AppleScript file that masquerades as a PDF Viewer application, activated if you view a particular PDF file with the app. Can only be activated if Gatekeeper is overridden. Reported by Jamf Threat Labs. MacStealerWhen: March 2023. What: The MacStealer malware can get passwords, cookies, and credit card data from Firefox, Google Chrome, and Brave browsers, including being able to extract the KeyChain database. Who: Macs running macOS Catalina or later, with either Intel or Apple M-series chips. For more information read: Scary MacStealer malware goes after iCloud passwords and credit card data.XMRigWhen: February 2023. What: Crypto-mining software attached to pirated copies of Final Cut Pro that are downloaded from unauthorized distribution points on the internet. XMRig is actually a legitimate, open-source utility, but in this illegitimate use it is running in the background mining, which affects the performance of the Mac. Mined cryptocurrency is sent to the attackers wallet. The malware can avoid detection by Activity Monitor app by stopping running when Activity Monitor launches and relaunching when the user quits Activity Monitor. Apple says it has updated macOSs Xprotect to catch this malware. Who: People who download pirated versions of Final Cut Pro using a torrent client. More here: Pirated copies of Final Cut Pro may infect your Mac.Mac malware in 2022AlchimistWhen: October 2022. What: Provides a backdoor onto the target system. Targeting a vulnerability in a 3rd party Unix tool. Who: Very specific target as pkexec is rarely found on Macs.LazarusWhen: August 2022. What: Malware disguised as job postings. Who: Targeting Coinbase users and Crypto.com.VPN TrojanWhen: July 2022. What: VPN app with two malicious binaries: softwareupdated and covid. CloudMensis/BadRAT When: July 2022. What: Spyware downloader that uses public cloud storage services such as Dropbox, Yandex Disk and pCloud. Exploited CVE-2020-9934 which was closed macOS Catalina 10.5.6 in August 2020. CrateDepressionWhen: May 2022. What: Supply chain attack with screencapture, keylogging, remote file retrieval. Who: Targeted the Rust development community.PymafkaWhen: May 2022. What: Hoping that users might mistype and download the malware instead of legitimate pykafka. Who: Targeting PyPI registry.oRAT When: April 2022. What: Distributed via a Disk Image masquerading as a collection of Bitget Apps. Who: Targeting gambling websites.Gimmick When: March 2022. What: Distributed as a CorelDraw file that was hosted on a Google Drive. Who: Targeting protest groups in Asia. DazzleSpyWhen: January 2022. What: Included code for searching and writing files, dumping the keychain, running a remote desktop and more. Read more here: Patched Mac malware sheds light on scary backdoor for hackers. Who: Targeting supporters of democracy in Hong Kong. ChromeLoaderWhen: January 2022. What: Chrome browser extension that could steal information, hijack the search engine queries, and serve adware.Mac malware in 2021macOS.Macma When: November 2021. What: Keylogger, screen capturer, screen capturer and backdoor. Who: Targetting supporters of pro-democracy activism in Hong Kong.OSX.Zuru When: September 2021. What: Trojan that spread disguised as iTerm2 app. Microsofts Remote Desktop for Mac was also trojanized with the same malware. Who: Spread via sponsored web links and links in the Baidu search engine.XCSSET UpdatedWhen: May 2021 (originally from August 2020). What: Used a zero-day vulnerability in Safari. See: macOS 11.4 patches flaws exploited by XCSSET malware. Who: Aimed at Chinese gambling sites.XLoaderWhen: July 2021. What: The XLoader malware was one of the most prevalent pieces of Windows malware to have been confirmed to run on macOS. XLoader is a variant of Formbook, a program used to steal login credentials, record keystrokes, and download and execute files.WildPressureWhen: July 2021. What: New multi-platform version of Milum Trojan embedded in a Python file. Who: Targeting Middle East activists.XcodeSpyWhen: March 2021. What: A Trojan hidden in Xcode projects in GitHub had the potential to spread among the Macs of iOS developers. Once installed a malicious script runs that installs an EggShell backdoor. Once open the Macs microphone, camera and keyboard can be hyjacked and files can be send to the attacker. The malware was found in a ripped version of TabBarInteraction. Read more here: New Mac malware targets iOS developers. Who: Attack on iOS developers using Apples Xcode.Silver Toucan/WizardUpdate/UpdateAgentWhen: February 2021. What: Adload dropper that was notarized by Apple and used a Gatekeeper bypass.Pirri/GoSearch22When: February 2021. What: Based on Pirri and known as GoSearch22 infected Macs would see unwanted adverts. More information here: M1 Macs face first recorded malware. Silver SparrowWhen: January 2021. What: Malware targeting Macs equipped with the M1 processor. Used the macOS Installer Javascript API to execute commands. According to Malwarebytes, by February 2021 Silver Sparrow had already infected 29,139 macOS systems in 153 countries, most of the infected Macs being in the US, UK, Canada, France and Germany. More details here: What you need to know about Silver Sparrow Mac malware.FoundryOSAMiner When: January 2021 (but first detected in 2015). What: Cryptocurrency miner distributed via pirated copies of popular apps including League of Legends and Microsoft Office.ElectroRAT When: January 2021. What: Remote Access Trojan targeting multiple platforms including macOS. Who: Targeting cryptocurrency users.Mac malware in 2020GravityRATWhen: October 2020. What: GravityRAT was an infamous Trojan on Windows, which, among other things, had been used in attacks on the military. It arrived on Macs in 2020. The GravityRAT Trojan can upload Office files, take automatic screenshots and record keyboard logs. GravityRAT uses stolen developer certificates to bypass Gatekeeper and trick users into installing legitimate software. The Trojan is hidden in copies of various legitimate programs developed with .net, Python and Electron. We have more information about GravityRAT on the Mac here.XCSSETWhen: August 2020. What: Mac malware spread through Xcode projects posted on Github. The malware a family of worms known as XCSSET exploited vulnerabilities in Webkit and Data Vault.Would seek to access information via the Safari browser, including login details for Apple, Google, Paypal and Yandex services. Other types of information collected includes notes and messages sent via Skype, Telegram, QQ and Wechat. More information here.ThiefQuest (aka EvilQuest)When: June 2020. What: ThiefQuest, which we discuss here: Mac ransomware ThiefQuest/EvilQuest could encrypt your Mac, was Ransomware spreading on the Mac via pirated software found on a Russian torrent forum. It was initially thought to be Mac ransomware the first such case since 2017 except that it didnt act like ransomware: it encrypted files but there was no way to prove you had paid a ransom and no way to subsequently unencrypted files. It turned out that rather than the purpose of ThiefQuest being to extort a ransom, it was actually trying to obtain the data. Known as Wiper malware this was the first of its kind on the Mac.Mac malware in 2019NetWire and MokesWhen: July 2019. What: These were described by Intego as backdoor malware with capabilites such as keystoke logging and screenshot taking. They were a pair of Firefox zero-days that targeted those using cryptocurrancies. They also bypassed Gatekeeper. backdoor malwareLoudMiner (aka Bird Miner)When: June 2019. What: This was a cryptocurrency miner that was distributed via a cracked installer for Ableton Live. The cryptocurrency mining software would attempt to use your Macs processing power to make money. OSX/NewTabWhen: June 2019. What: This malware attempted to add tabs to Safari. It was also digitally signed with a registered Apple Developer ID.OSX/LinkerWhen: May 2019. What: It exploited a zero-day vulnerability in Gatekeeper to install malware. The MacOS X GateKeeper Bypass vulnerability had been reported to Apple that February, and was disclosed by the person who discovered it on 24 May 2019 because Apple had failed to fix the vulnerability within 90 days. Who: OSX/Linker tried to exploit this vulnerability, but it was never really in the wild.CookieMinerWhen: January 2019. What: The CookieMiner malware could steal a users password and login information for their cyberwallets from Chrome, obtain browser authentication cookies associated with cryptocurrency exchanges, and even access iTunes backups containing text messages in order to piece together the information required to bypass two-factor authentication and gain access to the victims cryptocurrency wallet and steal their cryptocurrency. Unit 42, the security researchers who identified it, suggest that Mac users should clear their browser caches after logging in to financial accounts. Since its connected to Chrome we also recommend that Mac users choose a different browser. Find out more about CookieMiner Mac malware here.Mac malware in 2018SearchAwesomeWhen: 2018. What: OSX.SearchAwesome was a kind of adware that targets macOS systems and could intercept encrypted web traffic to inject ads.Mac Auto FixerWhen: August 2018. What: Mac Auto Fixer was a PiP (Potentially Unwanted Program), which piggybacks on to your system via bundles of other software. Find out more about it, and how to get rid of it, in What is Mac Auto Fixer?OSX/CrescentCoreWhen: June 2018. What: This Mac malware was found on several websites, including a comic-book-download site in June 2019. It even showed up in Google search results. CrescentCore was disguised as a DMG file of the Adobe Flash Player installer. Before running it would check to see if it inside a virtual machine and would looks for antivirus tools. If the machine was unprotected it would install either a file called LaunchAgent, an app called Advanced Mac Cleaner, or a Safari extension. CrescentCore was able to bypass Apples Gatekeeper because it had a signed developer certificate assigned by Apple. That signature was eventually revoked by Apple. But it shows that although Gatekeeper should stop malware getting through, it can be done. Again, we note that Adobe ended support for Adobe Flash on 31 December 2020, so this should mean fewer cases of malware being disguised as the Flash Player.MshelperWhen: May 2018. What: Cryptominer app. Infected users noticed their fans spinning particularly fast and their Macs running hotter than usual, an indication that a background process was hogging resources. OSX/ShlayerWhen: February 2018. What: Mac adware that infected Macs via a fake Adobe Flash Player installer. Intego identifed it as a new variant of the OSX/Shlayer Malware, while it may also be refered to as Crossrider. In the course of installation, a fake Flash Player installer dumps a copy of Advanced Mac Cleaner which tells you in Siris voice that it has found problems with your system. Even after removing Advanced Mac Cleaner and removing the various components of Crossrider, Safaris homepage setting is still locked to a Crossrider-related domain, and cannot be changed. Since 31 December 2020 Flash Player has been discontinued by Adobe and it no longer supported, so you can be sure that if you see anything telling you to install Flash Player please ignore it. You can read more about this incident here.MaMiWhen: January 2018. What: MaMi malware routes all the traffic through malicious servers and intercepts sensitive information. The program installs a new root certificate to intercept encrypted communications. It can also take screenshots, generate mouse events, execute commands, and download and upload files.Meltdown & SpectreFoundryWhen: January 2018. What: Apple confirmed it was one of a number of tech companies affected, highlighting that: These issues apply to all modern processors and affect nearly all computing devices and operating systems. The Meltdown and Spectre bugs could allow hackers to steal data. Meltdown would involve a rogue data cache load and can enable a user process to read kernel memory, according to Apples brief on the subject. Spectre could be either a bounds check bypass, or branch target injection according to Apple. It could potentially make items in kernel memory available to user processes. They can be potentially exploited in JavaScript running in a web browser, according to Apple. Apple issued patches to mitigate the Meltdown flaw, despite saying that there is no evidence that either vulnerability had been exploited. More here: Meltdown and Spectre CPU flaws: How to protect your Mac and iOS devices.Mac malware in 2017DokWhen: April 2017. What: macOS Trojan horse appeared to be able to bypass Apples protections and could hijack all traffic entering and leaving a Mac without a users knowledge even traffic on SSL-TLS encrypted connections. OSX/Dok was even signed with a valid developer certificate (authenticated by Apple) according to CheckPoints blog post. It is likely that the hackers accessed a legitimate developers account and used that certificate. Because the malware had a certificate, macOSs Gatekeeper would have recognized the app as legitimate, and therefore not prevented its execution. Apple revoked that developer certificate and updated XProtect. OSX/Dok was targeting OS X users via an email phishing campaign. The best way to avoid falling foul to such an attempts is not to respond to emails that require you to enter a password or install anything. More here.X-agentWhen: February 2017. What: X-agent malware was capable of stealing passwords, taking screenshots and grabbing iPhone backups stored on your Mac. Who: The malware apparently targeted members of the Ukrainian military and was thought to be the work of the APT28 cybercrime group, according to Bitdefender.MacDownloaderWhen: February 2017. What: MacDownloader software found in a fake update to Adobe Flash. When the installer was run users would get an alert claiming that adware was detected. When asked to click to remove the adware the MacDownloader malware would attempt to transmit data including the users Keychain (usernames, passwords, PINs, credit card numbers) to a remote server. Who: The MacDownloader malware is thought to have been created by Iranian hackers and was specifically targetted at the US defence industry. It was located on a fake site designed to target the US defence industry.Word macro virusWhen: February 2017. What: PC users have had to contend with macro viruses for a long time. Applications, such as Microsoft Office, Excel, and Powerpoint allow macro programs to be embedded in documents. When these documents are opened the macros are run automatically which can cause problems. Mac versions of these programs havent had an issue with malware concealed in macros because since when Apple releasedOffice for Mac 2008 it removed macro support. However, the 2011 version of Office reintroduced macros, and in February 2017 there was malware discovered in a Word macro within a Word doc about Trump. If the file is opened with macros enabled (which doesnt happen by default), it will attempt to run python code that could have theoretically perform functions such as keyloggers and taking screenshots. It could even access a webcam. The chance of you being infected in this way is very small, unless you have received and opened the file referred to (which would surprise us), but the point is that Mac users have been targeted in this way.FruitflyWhen: January 2017. What: Fruitfly malware could capture screenshots and webcam images, as well as looking for information about the devices connected to the same network and then connects to them. Malwarebytes claimed the malware could have been circulating since OS X Yosemite was released in 2014.Mac malware in 2016PirritWhen: April 2016. What: OSX/Pirrit was apparently hidden in cracked versions of Microsoft Office or Adobe Photoshop found online. It would gain root privileges and create a new account in order to install more software, according to Cybereason researcher Amit Serper in this report.Safari-getWhen: November 2016. What: Mac-targeted denial-of-service attacks originating from a fake tech support website. There were two versions of the attack depending on your version of macOS. Either Mail was hijacked and forced to create vast numbers of draft emails, or iTunes was forced to open multiple times. Either way, the end goal is to overload system memory and force a shutdown or system freeze. KeRangerWhen: March 2016. What: KeRanger was ransomware (now extinct). For a long time ransomware was a problem that Mac owners didnt have to worry about, but the first ever piece of Mac ransomware, KeRanger, was distributed along with a version of a piece of legitimate software: the Transmission torrent client. Transmission was updated to remove the malware, and Apple revoked the GateKeeper signature and updated its XProtect system, butnot before a number of unlucky users got stung. We discuss how to remove Ransomware here.Older Mac malwareSSL, Gotofail errorWhen: February 2014. What: The problem stemmed from Apples implementation of a basic encryption feature that shields data from snooping. Apples validation of SSL encryption had a coding error that bypassed a key validation step in the web protocol for secure communications. There was an extra Goto command that hadnt been closed properly in the code that validated SSL certificates, and as a result, communications sent over unsecured Wi-Fi hotspots could be intercepted and read while unencrypted. Apple quickly issued an update to iOS 7, but took longer to issued an update for Mac OS X, despite Apple confirming that the same SSL/TSL security flaw was also present in OS X. Who: In order for this type of attack to be possible, the attacker would have to be on the same public network. Read more about the iPad and iPhone security flaw here.OSX/Tsnunami.AWhen: October 2011. What: OSX/Tsnunami.A was a new variant of Linux/Tsunami, a malicious piece of software that commandeers your computer and uses its network connection to attack other websites. More information here. OSX.Revir.AWhen: September 2011. What: Posing as a Chinese-language PDF, the nasty piece of software installs backdoor access to the computer when a user opens the document. More here.Flashback trojan When: September 2011. What: Flashback is thought to have been created by the same people behind the MacDefender attack and could use an unpatched Java vulnerability to install itself. Read more here: What you need to know about the Flashback trojan. Who: Apparently more than 500,000 Macs were infected by April 2012. MacDefender When: May 2011. What: Trojan Horse phishing scam that purported to be a virus-scanning application. Was spread via search engine optimization (SEO) poisoning.BlackHole RATWhen: February 2011. What: More of a proof-of-concept, but a criminal could find a way to get a Mac user to install it and gain remote control of the hacked machine. BlackHole was a variant of a Windows Trojan called darkComet. More information here: Hacker writes easy-to-use Mac Trojan.For more information about how Apple protects your Mac from security vulnerabilities and malware read: Do Macs need antivirus software and How to protect your Mac against attack and disaster to avoid getting infected.
    0 Comments ·0 Shares ·28 Views
  • China targets Apples business practices; maybe the company should adapt
    www.computerworld.com
    They say great art reflects its time. When it comes to Apples business, just as the iMac and iPod matched the zeitgeist, the company must now develop its business to meet the complex demands of a divided, post-globalist world struggling with economic and climate insecurity. Apple should bear that in mind as it faces its latest regulatory nightmare, this time in China, where its practices concerning in-app purchases and external payment servicesface fresh scrutiny.Apple has been in disputes about in-app payments with big Chinese developers Tencent and ByteDance for some time. It argues that loopholes in their apps let them avoid the in-app commission it demands. With Chinas State Administration for Market Regulation (SAMR) commencing scrutiny of Apples business practices, regulators may advise Apple to make changes to its approach. And it faces the threat of a formal investigation if it resists those recommendations.Tension and mistrustBut this isnt just a business practice investigation. The scrutiny comes at a time of growing tension between China and the United States. The US has implemented tariffs on some Chinese imports, which China is expected to reciprocate. Apple is undeniably a proud US firm, and while it has a strong and mutually profitable business relationship in China, it continues to face challenges. In the US, tariffs directly threaten Apples business. Apple is stuck between a rock and a hard place.Apple has danced delicately around both nations so far, while also taking steps to protect its business from further disruption, principally through investing in new production centers and its growing services business. The biggest hardware change is to establish production in India, where around 25% of all iPhones sold worldwidewill be manufactured soon. China has pushed back against this strategy and has alreadydisrupted travelbetween China and India for key Foxconn engineers.That Apple now faces regulatory challenges in China is completely predictable in the circumstances, particularly as China recently began a similar investigationagainst Google. Scrutiny of Apples App Store business is, of course, far from being a China-only problem. Apple faces similar regulatory challenges now inmost major markets, with the EU and UK already leading the charge in terms offorcing platform decay through changed business practices.The fight for platform integritySo far, the company seems to have approached these challenges on a market-by-market basis. But that may not be the best long-term approach, as it runs the risk of fragmenting the companys business. Think about it fragmentation is inevitable as each nation will apply slightly different restrictions on business practices, generating friction for Apple, Apple developers, and Apple customers as each market adoptsdifferent approaches.This increases complexity at the risk of the user experience and platform integrity.With this in mind, it would perhaps be better now for Apple to embrace the inevitability of change and attempt to put together a set of core business practice proposals likely to be approved by most regulators. Doing so now would show fresh willingness to embrace change, while perhaps giving the company a chance to protect platform integrity.That integrity is currently being chipped away by regulators whoseem deaf to many of Apples arguments. It is inarguable that Apple is not prevailing, and while I am one of many who thinks many of its arguments are solid, those voices arent being heard.Its hard to ignore the political dimensions of these discussions, as one of the worlds biggest US companies sees parts of its business chipped away by various nations for many reasons: Europe, for example, wants to open the tech market up to create opportunity for European firms, while the UK doesnt seem to know what it wants, tending to the worst available approach, whilemuttering platitudes about growth.These ambitions seem to reflect an entirely different era of growth and of trade but those old iPod-eyed days are done. We are witnessing the old world struggle while a new one seeks to be born. Meanwhile, others work toexploit this insecurityfor their own benefit.Complex times, Complex discussionsFacing such complexity, Apple cannot be certain that it will prevail in defending its existing business models in the courts; laws have and will change in response to some of the global forces in play.Despite the strength of many Apple arguments, the company might well achieve better outcomes if it chooses to negotiate and embrace change, rather than remaining a victim of decisions reached by politically-led courts.Like it or not, (and many of us dont), the company needs a vision for the future of its business that better reflects the current zeitgeist, while also laying much-needed bricks in the road toward a better, perhaps more unified, age.You can follow me on social media! Join me onBlueSky, LinkedIn,Mastodon, andMeWe.
    0 Comments ·0 Shares ·30 Views
  • Crypto wallets at risk as malware sneaks into the App Store
    appleinsider.com
    A newly discovered malware campaign is stealing cryptocurrency from iOS by exploiting vulnerabilities in apps available on the App Store.iPhone 16 Pro MaxKaspersky researchers have discovered a malicious software development kit (SDK) called SparkCat hidden inside multiple apps on both iOS and Android. SparkCat is designed to steal cryptocurrency wallet recovery phrases using optical character recognition (OCR), allowing attackers to access and drain funds remotely.Kaspersky has shared a list of MD5 hashes linked to the malicious SparkCat SDK, as well as BundleIDs for iOS apps. However, the company hasn't revealed the full list of infected apps, leaving users in the dark about whether they've installed one. Continue Reading on AppleInsider | Discuss on our Forums
    0 Comments ·0 Shares ·30 Views
  • Everything you need to know about Surfshark One VPN bundle for Apple devices
    appleinsider.com
    If you're looking for a private and fast VPN for Mac, along with an antivirus and leak notification tool, Surfshark One has it bundled together to help reduce your digital footprint online.Surfshark One - Image credit: SurfsharkThe internet is a hazardous place these days. Users have to go out of their way to avoid unnecessary tracking, keep malware off their systems, and learn about potentially harmful data breaches.Thankfully there's a single service that does it all called Surfshark One. You might have heard of Surfshark VPN, one AppleInsider has rated the best VPN for iPhone in 2025, and it is bundled with other industry-leading products. Continue Reading on AppleInsider
    0 Comments ·0 Shares ·29 Views