Apple AirTags can be used as trojan for credential hacking

By Waqas
According to penetration tester and security researcher Bobby Raunch, Apple’s AirTags can be used for credential hacking and data theft vectors. 
This is a post from HackRead.com Read the original post: Apple AirTags can be used as trojan for … Continue reading Apple AirTags can be used as trojan for credential hacking

iCloud phishing scam – Man stole private photos of 620,000 women

By Waqas
LA County resident booked in iCloud phishing scam pretended to be an Apple agent and stole 620,000 photos, 9,000 videos of 306 young women.
This is a post from HackRead.com Read the original post: iCloud phishing scam – Man stole private… Continue reading iCloud phishing scam – Man stole private photos of 620,000 women

Man admits impersonating Apple support staff to steal 620,000 photos from iCloud accounts

A 40-year-old man has agreed to plead guilty to US court charges that he broke into thousands of Apple iCloud accounts and stole hundreds of thousands of images and videos of young women.

Read more in my article on the Hot for Security blog. Continue reading Man admits impersonating Apple support staff to steal 620,000 photos from iCloud accounts

Apple’s neuralMatch tool will scan iPhones for child abuse content

By Deeba Ahmed
Apple has developed a system dubbed neuralMatch to located child sexual abuse material/CSAM, and for now, it will scan US customers’ devices.
This is a post from HackRead.com Read the original post: Apple’s neuralMatch tool will sc… Continue reading Apple’s neuralMatch tool will scan iPhones for child abuse content

I suspect that my mac laptop is infected with malware that can view all my activity. What should I do?

Is it sufficient to reformat with a new osx install. If so, can the malware persist in cloud syncing programs like adobe creative cloud, icloud, onedrive and google drive?

Continue reading I suspect that my mac laptop is infected with malware that can view all my activity. What should I do?