Skip to main content

Security

See All Stories

Security vulnerability in Apple’s Device Enrollment Program could allow full access to corporate networks

A security vulnerability discovered in Apple’s Device Enrollment Program (DEP) could allow an attacker to gain full access to a corporate or school network.

The DEP is a free service offered by Apple to allow new devices to be automatically configured with everything from custom apps to VPN settings. All that is needed is the serial number of the device, and that’s the root of the problem, says the security researcher who discovered it …


Expand
Expanding
Close

US carriers want to replace your passwords, what could go wrong?

While AT&T, Verizon, T-Mobile, and Sprint are often battling for an edge over each other, the major US carriers have come together to create a new approach to password management as well as a more secure 2FA solution. Named Project Verify, the new collaboration has the goal of replacing individual passwords with an approach that offers more security and a simpler user experience.


Expand
Expanding
Close

Additional Mac App Store apps caught stealing and uploading browser history

[Update 9/10 4:50 am PT: The certificate issued for the domain drcleaner.com is registered as Trend Micro, Inc. Also, the domain where the data is uploaded to is a subdomain of trendmicro.com, this means the apps are in fact distributed by Trend Micro, Inc.]

[Update 9/9 7:46 pm PT: The apps discussed in this article have been removed from the Mac App Store.]

When you give an app access to your home directory on macOS, even if it’s an app from the Mac App Store, you should think twice about doing it. It looks like we’re seeing a trend of Mac App Store apps that convince users to give them access to their home directory with some promise such as virus scanning or cleaning up caches, when the true reason behind it is to gather user data – especially browsing history – and upload it to their analytics servers.

Today, we’re talking specifically about the apps distributed by a developer who claims to be “Trend Micro, Inc.”, which include Dr. Unarchiver, Dr. Cleaner and others. This issue was reported before by a user on the Malwarebytes forum, and in another report. Other researchers followed up and found that apps distributed by this “Trend Micro, Inc.” account on the Mac App Store collect and upload the user’s browser history from Safari, Google Chrome and Firefox to their servers. The app will also collect information about other apps installed on the system. All of this information is collected upon launching the app, which then creates a zip file and uploads it to the developer’s servers.


Expand
Expanding
Close

No. 1 paid utility in Mac App Store steals browser history, sends it to Chinese server

[Update 8:54 am PT: Apple has pulled Adware Doctor from the Mac App Store. See below for more.]

Adware Doctor, the number one paid utility in the Mac App Store, is secretly logging the browser history of users, and sending it to a server in China.

Security researcher Patrick Wardle says that he notified Apple of this a month ago, but the malware app still remains available in the Mac App Store today …


Expand
Expanding
Close

British Airways app and website hack exposes full card details of 380,000 customers

A ‘sophisticated’ attack on British Airways’ mobile app and website has exposed the names, email addresses and full credit card details of 380,000 customers.

Of particular concern is the fact that the attackers captured the three-digit CVV security codes on the backs of cards, something that should not normally be possible …


Expand
Expanding
Close

Security researchers show how attackers targeting Airmail for Mac could get a copy of all your emails

Security researchers at Versprite have identified security flaws in Airmail for Mac that can expose private data, including an entire account’s email database. The attack requires a user to open a maliciously crafted email and tap a link inside the message. With a combination of technical exploit and phishing attack, it seems like a significant problem.


Expand
Expanding
Close

Proposed Australian law threatens Apple with $7.3M fine, jail time, over encrypted data

The Australian government has today proposed a new law which would require tech companies like Apple to give authorities access to encrypted data on receipt of a warrant. Failure to comply would leave the company liable to fines of up to A$10 million ($7.3 million), and potential jail time.

Apple does already comply with court orders demanding access to encrypted data where it has the means to do so and is satisfied that doing this is legal, but cannot do so for Messages and FaceTime …


Expand
Expanding
Close

Ex-NSA staffer demonstrates malware bypassing security checks in High Sierra

Security research and former NSA staffer Patrick Wardle says that he will demonstrate on Sunday a set of automated attacks against macOS High Sierra, in which he is able to bypass security checks.

The checks are ones that ask the user to confirm that an app should be granted permission to do things like access contacts or location data …


Expand
Expanding
Close