Silver Sparrow malware aiming at all Macs
Mysterious new malware has been detected on nearly 30,000 Mac devices, including those that run on the new Apple M1 chip.
The so-called Silver Sparrow malware was discovered by researchers at security firm Red Canary, who said that it poses “a reasonably serious threat” due to its “forward-looking M1 chip compatibility, global reach, relatively high infection rate, and operational maturity.” Basically, it’s bad news for Mac old and new.
This no-frills security system works well enough to support its $130 price tag. If you’re looking for a basic—extremely basic—DIY Read more
Microsoft's Virtualization Based Security feature can indeed slow down your performance—sometimes by a lot. Security is key to Windows 11—and Read more
Designed for indoor use, the Amaryllo Apollo ($199.99) is a pricey security camera that offers mechanical pan and tilt maneuverability, Read more
Amazon unveiled a wealth of new products earlier this week, including a cool looking robot butler named Astro. But with Read more
Researcher says Apple has known of these since April UPDATED with additional information. A researcher has posted exploits for three Read more
Update for older iPhones and iPads. Which the chatter nowadays is all about the latest versions of the iPhone and Read more
Anyone using a computer that runs AMD Ryzen hardware needs to apply the latest driver updates to secure their computer Read more
The iOS 15 update packs tons of new privacy features — these are the most important ones Apple has tossed Read more
Available in Wi-Fi, PoE, and 4G configurations, Reolink's dual-lens cameras offer a 150-degree field of view for larger properties. Reolink Read more
Arlo’s $99.99 Essential Indoor Security Camera offers intelligent alerts, voice control, and works with a wide assortment of third-party smart Read more
The Xiaomi 11T and Xiaomi 11T Pro launch nears, with Xiaomi set on unveiling the pair a day after Apple Read more
Microsoft has confirmed another Windows 10 vulnerability is being actively exploited, with attackers taking advantage of a security loophole that Read more