Impregnable Mac? MacStealer wants a word.

Impregnable Mac? MacStealer wants a word.

Right then, let’s have a look at this “MacStealer” malware, shall we? Seems even the shiny, supposedly impenetrable world of macOS isn’t quite as squeaky clean as some Apple fanboys would have you believe. MacStealer: Cracks in the Apple? For...
The Capita Breach: What You Need to Know

The Capita Breach: What You Need to Know

You might have heard whispers, or perhaps even seen the headlines, but the cyberattack on Capita in April 2023 was a proper kerfuffle that sent ripples across the UK. As a major provider of outsourced services for a huge chunk of our public sector, any hiccup at...
Malware vs Potentially Unwanted Programs

Malware vs Potentially Unwanted Programs

If you use a computer, you need to be aware of the threats that can harm your device and your security. Two common types of threats are malware and potentially unwanted programs (PUPs). In this post, we will explain what they are, how they differ, and how to avoid...
Seasons Greetings – The Christmas Tree Attack

Seasons Greetings – The Christmas Tree Attack

A Christmas tree attack is a type of cyber attack that targets a computer network or system by sending a large number of malicious packets to a specific network service or port. These packets contain malicious payloads or exploit code that can be used to gain...
The Dangers of Online Christmas Shopping

The Dangers of Online Christmas Shopping

Online shopping has become increasingly popular in recent years, and it’s no surprise that it’s especially popular during the holiday season. With the convenience of shopping from home and the ability to find great deals, it’s easy to see why so many...