Mac Articles

A look at the leaked CIA malware attacks on Apple software

  • 26/03/2017 at 23:32 by It's a Gadget Staff
  • News

Smartphone SpyWikileaks has once more released a series of documents that claim to show malware the CIA used to spy on owners of Apple products. And they are pretty hardcore.

The CIA’s Target: Macs

We have seen many examples of how the CIA, among other organizations, have used exploits to get backdoor access into people’s phones, computers, and other devices. But this is a new set of revelations, specifically targeting Mac computers using directly targeted malware installed by CIA operatives.

+Continue Reading

OS X Mountain Lion roars with Apple upgrades

OS X Mountain LionSo what happens when Apple releases a new operating system? Well today it’s not just an Operating System update, there is a whole lot more going on. From how the Operating System sleeps, interacts with applications and a few new applications included with the software – this update is a winner for Mac owner’s everywhere.

The big winner though is it is bringing a unified login to Apple users. This is the foundation every major OS player has to start leaning towards to allow true interaction between device types. Google’s been doing it already and it looks like Apple now has it down.

+Continue Reading

More than half a Million Mac Computers are Hosting Malware

Mac OS XAn amazing 600,000 Apple computers were struck and conquered by the Flashback Trojan, Dr. Web from Russia claims. It infiltrates as a malware and then converts the machine into a botnet. A botnet is a network of machines vulnerable to the control of someone other than it’s users. What is worse is that more than half of these infected Macs reside in the U.S, according to Dr. Web’s estimates.

As could be expected, Apple responded with a security patch. Without the patch, your system lies vulnerable or at worst infected already. So do not wait to patch your Apple.

Flashback made itself known by disguising as a simple update on Flash Player. Accepting the request put the malware on the unsuspecting user’s computer, followed by a deactivation of selective security features.

+Continue Reading