1. Blogs
    November 14th, 2014 by Glenn Fleishman
    Let the right one in: Apple uses two doors to manage malware

    Two recent security incidents, WireLurker and Masque Attack, highlight both the ease and difficulty of slipping malware onto iOS. But they also...

  2. News
    November 10th, 2014 by Jeremy Kirk
    Apple blocks infected WireLurker apps from running

    Apple has acted quickly to address a malware threat to iOS and Mac OSX computers, saying it has blocked apps from running that are infected with the...

  3. News
    November 7th, 2014 by Jeremy Kirk
    Chinese iOS devices fall prey to invasive WireLurker malware

    Researchers at Palo Alto Networks said they’ve discovered an impressive malware attack against Apple devices, which for now appears to be limited...

  4. News
    November 6th, 2014 by Jeremy Kirk
    Apple security checks may miss iWorm malware

    Apple’s security technologies for Mac OS X may still miss iWorm, a piece of malware discovered in late September that infected thousands of...

  5. News
    September 26th, 2014 by Brad Chacos
    Shellshock flaw leaves OS X, Linux, more open to attack

    Well, this isn’t good. Akamai security researcher Stephane Chazelas has discovered a devastating flaw in the Unix Bash shell, leaving Linux...

  6. News
    September 8th, 2014 by Lucian Constantin
    Cyberespionage group uses port of Windows backdoor to attack OS X

    A group of hackers known for past cyberespionage attacks against the US Defense Industrial Base, as well as companies from the electronics and engineering...

  7. Help
    August 20th, 2014 by Ted Landau
    Bugs & Fixes: Phony Photozoom malware adds ads

    Recently, upon visiting my Slanted Viewpoint blog, I was shocked to see an advertisement at the top of the page. I had never selected, modified or...

  8. Features
    May 9th, 2014 by Anthony Caruana
    Apple security: Securing your Mac and iOS devices

    Most of the time, Mac users sit back, grab a bowl of popcorn and enjoy the show as Windows and Android users fight against the latest piece of nasty...

  9. News
    February 26th, 2014 by Lucian Constantin
    New iOS flaw allows malicious apps to record touch screen presses

    Security researchers identified a vulnerability in iOS that allows apps to record all touch screen and button presses while running in the background...

  10. News
    February 26th, 2014 by Madeleine Swain
    Apple releases patch for OS X security flaw

    Keeping to its promise of delivering a fix for the major SSL security flaw “very soon“, Apple has released OS X 10.9.2, which addresses...

  11. Blogs
    February 4th, 2014 by Roger A Grimes
    Eleven sure signs you’ve been hacked

    In today’s threatscape, antivirus software provides little peace of mind. In fact, anti-malware scanners on the whole are horrifically inaccurate,...

  12. News
    February 3rd, 2014 by John E. Dunn
    Malicious Java app infects Mac, Linux systems with DDoS bot

    Criminals are once again using Java’s cross-platform design to add Linux and Mac users to their usual Windows target list, Kaspersky Labs researchers...

  13. Blogs
    January 30th, 2014 by George V Hulme
    iOS versus Android: which is more secure?

    With millions of new iOS and Android devices pouring into the enterprise every quarter, it’s important to know just how much risk these devices...

  14. News
    December 20th, 2013 by Lucian Constantin
    Older Mac webcams can spy without activating warning light, researchers find

    Most webcams have a warning light that indicates when they’re active, but it’s possible for malware to disable this important privacy...

  15. Blogs
    December 9th, 2013 by Mike Elgan
    Are your smartphone apps selling you out?

    The President of the US says he’s not “allowed” to own an iPhone, which is why he’s sticking with his BlackBerry, according...

  16. News
    November 4th, 2013 by Mark Hachman
    Google’s Chrome will automatically block malware

    A developer version of Google’s Chrome browser will automatically flag and block malware that the user’s anti-malware system wouldn’t otherwise...

  17. Blogs
    October 20th, 2013 by Jeremy Kirk
    Facebook ‘stalker’ tool uses Graph Search for powerful data mining

    When a high-profile public figure living in Hong Kong hired the security company Trustwave to test if its experts could get his passwords, they turned...

Contact us
x
Sign up to the Macworld Australia newsletter

Receive the latest:

  • Apple news directly to your inbox
  • Features, opinion, tips and tricks
  • Information on the tools that will run your business more efficiently

Sign up now!
X


Sign up to the newsletter