French police have defeated a botnet that infected over 850,000 computers. It was created with the Retadup malware. With the help of a web host, they cloned the command & control server and used it to disinfect the zombie computers.
“The malware authors were mostly distributing cryptocurrency miners, making for a very good passive income,” the security company said. “But if they realized that we were about to take down Retadup in its entirety, they might’ve pushed ransomware to hundreds of thousands of computers while trying to milk their malware for some last profits.”
The DoJ charged a Pakistani man with bribing AT&T employees to install malware on the company’s network and unlock customer devices.
In July alone, Google Play had 205 malicious apps with over 32 million installations, most of them containing hidden ads.
The bulk of the suspicious software – 188 to be exact – contained hidden ads, accounting for 19.2 million installs. The rest of the offenders fell under the categories of subscription scam, ad fraud, stalkerware, fake apps, fake antivirus tools, adware droppers, and software with built-in backdoors, according to data compiled by ESET malware researcher Lukas Stefanko.
After the controversy surrounding Zoom and its hidden web server, Apple is pushing a hidden Mac update that removes it.
Security researchers have discovered a piece of Mac malware called OSX/Linker that can exploit a zero day vulnerability in macOS GateKeeper.
This morning Samsung took to Twitter to warn of smart TV malware, and remaining customers to regularly do a virus scan.
How fast is your connection? How much of that speed matters? How fast is your Mac? Why isn’t it faster? What devices can you see on your network? Why can’t you connect to all of them? This is what Mac Geek Gab is about. Posing questions, getting answers, and learning at least 5 new things. Learn your 5 now by pressing play!
Dave Hamilton and Bryan Chaffin join host Kelly Guimont to talk about malware on macOS (real) and Apple’s sole responsibility for the stock market’s wellbeing (not real).
Cryptocurrency malware has been found in Adobe Flash updates by researchers from Palo Alto Networks. It’s a Monero mining bot.
The FBI has solved the Fruitfly Mac malware case after fifteen years. It was created by a man from Ohio who was arrested in January 2017.
Google Chrome has a nifty way to reset a lot of its options to their defaults, from what your startup page is to your enabled extensions. This is incredibly helpful if you’ve managed to get some adware installed within that browser! We’ve got the cleanup details in today’s Quick Tip.
Kaspersky Labs wrote an informative blog post on why you don’t need an iOS antivirus app. In short, apps can’t access other apps’ data.
Researchers funded by the Department of Homeland Security recently found security flaws in millions of smartphones, including iPhones.
Cisco’s Talos Intelligence Group discovered the MDM hack.
Your Mac’s root-level LaunchAgents folder is a common location for adware to store files. Why is this bad? Well, it could mean that malicious software launches automatically when you log in to any user account on your Mac, which is certainly not great. In today’s Quick Tip, we’ll talk about how to get there and what to look for!
Dave Hamilton and John Martellaro join Jeff Gamet to explain what’s behind the FBI’s warning to reboot your home network router, plus they share their thoughts on the possibility of a Mac with an ARM processor.
So you’ve downloaded files to your Mac. What’s an easy way to see where they came from if you forget? Or how can you tell where your dad got that pirated copy of Microsoft Office? In today’s Quick Tip, we’ll tell you how to see that info…and maybe help you call out your dad’s terrible computing habits.
This strain of Crossrider comes in the form of a fake Adobe Flash Player installer.
Adam Christianson from the Maccast and Kelly Guimont join Jeff Gamet to look at what the pending demise of Google Play Music means for Apple Music, plus they have a warning about a new Flash malware threat on the Mac.
The Mac Observer has some best practices to make sure you’re safe from phishing attacks: