iPhone

MalwareBytesSecurity

Malvertising on iOS pushes eyebrow-raising VPN app

Credit to Author: Jérôme Segura| Date: Thu, 06 Apr 2017 17:10:49 +0000

A malvertising campaign on iOS is pushing a scareware page tricking Apple users into installing a free VPN app that comes with serious privacy implications.

Categories:

Tags:

(Read more…)

The post Malvertising on iOS pushes eyebrow-raising VPN app appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Hackers threaten to wipe Apple devices

Credit to Author: Thomas Reed| Date: Thu, 23 Mar 2017 15:00:40 +0000

According to a report from Motherboard, a group of hackers calling themselves “Turkish Crime Family” is threatening to remotely erase devices belonging to hundreds of millions of Apple customers. They will do this on April 7, they say, if Apple doesn’t pay them a ransom.

Categories:

Tags:

(Read more…)

The post Hackers threaten to wipe Apple devices appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Two new Mac backdoors discovered

Credit to Author: Thomas Reed| Date: Wed, 01 Mar 2017 15:00:33 +0000

On Valentine’s Day, Mac users got a special “treat” in the form of new malware. Now, just a week later, there are signs of yet another piece of malware looming. This brings the count of malware (as opposed to adware or other threats) discovered for macOS this year up to 4, in only two short months.

Categories:

Tags:

(Read more…)

The post Two new Mac backdoors discovered appeared first on Malwarebytes Labs.

Read More
IndependentKrebs

iPhone Robbers Try to iPhish Victims

Credit to Author: BrianKrebs| Date: Fri, 24 Feb 2017 21:21:24 +0000

In another strange tale from the kinetic-attack-meets-cyberattack department, earlier this week I heard from a loyal reader in Brazil whose wife was recently mugged by three robbers who nabbed her iPhone. Not long after the husband texted the stolen phone — offering to buy back the locked device — he soon began receiving text messages stating the phone had been found. All he had to do to begin the process of retrieving the device was click the texted link and log in to the phishing page mimicking Apple’s site.

Read More