Mac

Avast security products win awards | Avast

You deserve protection online, no matter what device or operating system you are using. When we started Avast, over 30…

2 years ago

Mac Management Replacement

The traditional methods of managing Mac® systems and users aren’t working. Some options require a handful of add-ons to function…

2 years ago

New strain of Mac malware Proton found after two years

A new variant of the Mac malware Proton, which was rampant on macOS last year, has been found dating back…

2 years ago

Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will…

3 years ago

macOS® Server EOL?

Is macOS® server EOL (end-of-life)? It’s an interesting question. After all, IT admins use macOS Server to handle a variety…

3 years ago

“Black Dot of Death” locks iOS messaging app

People who use iPhones, iPads, and Macs are at risk of encountering a Unicode attack that can cause the messaging…

3 years ago

New Mac cryptominer uses XMRig

New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs. Categories: Mac Threat analysis Tags:…

3 years ago

Seven security tips for staying safe on an iPhone

iPhones have a reputation for being incredibly secure. However, using an iPhone is not an automatic guarantee of invulnerability. These…

3 years ago

End of Life for macOS Open Directory?

Are Apple’s recent announcements around macOS server indicating the end of life for macOS Open Directory? Unfortunately, it isn’t clear…

3 years ago