Tag: apple
-
Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware
Cybercriminals are exploiting Google Search Ads to distribute malware through deceptive landing pages that impersonate Apple’s official website design. The malicious ads appear prominently in Google Search results when users search for >>mac cleaner,<< displaying trusted domains such as docs.google.com and business.google.com as landing pages. However, clicking these ads redirects users to Google Apps Script…
-
Nudify app proliferation shows naked ambition of Apple and Google
Researchers with the Tech Transparency Project found all sorts of apps that let users create fake non-consensual nudes of real people First seen on theregister.com Jump to article: www.theregister.com/2026/01/27/nudify_app_proliferation_shows_naked/
-
$95M Payout: Apple Begins Compensating Users in Siri Eavesdropping Case
Apple has started issuing Siri privacy settlement payouts, with claimants seeing deposits as low as $8 per device from a $95 million fund. The post $95M Payout: Apple Begins Compensating Users in Siri Eavesdropping Case appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-apple-siri-eavesdropping-settlement-payouts/
-
Apple Issues Urgent Software Fix Affecting Over 2 Billion iPhones
Apple released urgent iOS updates, including iOS 12.5.8 for older iPhones, after emergency-call issues in Australia and a 2027 certificate deadline. The post Apple Issues Urgent Software Fix Affecting Over 2 Billion iPhones appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-apple-urgent-iphone-software-update-january-2026/
-
WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
Meta on Tuesday announced it’s adding Strict Account Settings on WhatsApp to secure certain users against advanced cyber attacks because of who they are and what they do.The feature, similar to Lockdown Mode in Apple iOS and Advanced Protection in Android, aims to protect individuals, such as journalists or public-facing figures, from sophisticated spyware by…
-
Apple updates AirTag with expanded range and improved findability
Apple has released a new version of its AirTag tracking accessory that extends its connectivity range and improves how items are located. The updated AirTag uses a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/26/new-apple-airtag-2026/
-
Apple Pay im Visier: Warum Betrüger nicht Ihr Handy, sondern Ihren Kopf hacken
Tags: appleIm folgenden Artikel zeigen wir die häufigsten Betrugsarten rund um Apple Pay und wie Sie sich davor schützen. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/scams/apple-pay-im-visier-warum-betruger-nicht-ihr-handy-sondern-ihren-kopf-hacken/
-
Apple Pay im Visier: Warum Betrüger nicht Ihr Handy, sondern Ihren Kopf hacken
Tags: appleIm folgenden Artikel zeigen wir die häufigsten Betrugsarten rund um Apple Pay und wie Sie sich davor schützen. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/scams/apple-pay-im-visier-warum-betruger-nicht-ihr-handy-sondern-ihren-kopf-hacken/
-
RansomHub claims alleged breach of Apple partner Luxshare
Chinese electronic manufacturer and Apple partner Luxshare Precision Industry has allegedly been breached by affiliates of the RansomHub ransomware-as-a-service outfit. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/21/luxshare-data-breach-apple-ransomhub/
-
New iOS and iPadOS Flaws Leave Millions of iPhones at Risk
Critical iOS and iPadOS WebKit flaws put millions of iPhones and iPads at risk of silent takeover. Apple urges users to update immediately. The post New iOS and iPadOS Flaws Leave Millions of iPhones at Risk appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-ios-ipad-os-flaws-iphones-at-risk/
-
RansomHouse Claims Data Breach at Major Apple Contractor Luxshare
RansomHouse claims to have breached Apple contractor Luxshare, but no evidence has been released. Links are offline and the breach remains unverified. First seen on hackread.com Jump to article: hackread.com/ransomhouse-data-breach-apple-contractor-luxshare/
-
Ransomware attack on Ingram Micro impacts 42,000 individuals
Tags: apple, attack, cisco, cybersecurity, data, data-breach, jobs, microsoft, ransomware, service, supply-chain, technologyIngram Micro says a ransomware attack exposed personal data of about 42,000 people, including names, birth dates, SSNs, and job-related details. Ingram Micro is a global technology distributor and supply-chain services company. It acts as a middleman between IT vendors (like Microsoft, Cisco, HP, Apple, and cybersecurity firms) and businesses, resellers, and service providers, helping…
-
Python-Bibliotheken für Hugging-Face-Modelle vergiftet
Tags: ai, apple, cve, exploit, intelligence, malware, ml, network, nvidia, rce, remote-code-execution, tool, vulnerabilityPython-Libraries sind mit manipulierten Metadaten in KI-Modellen infiziert und können beim Laden Schadcode ausgeführen.NeMo, Uni2TS und FlexTok, Python-Bibliotheken für Künstliche Intelligenz (KI) und Machine Learning (ML), die in Hugging-Face-Modellen verwendet werden, haben gravierende Schwächen. Wie Forschende von Palo Alto Networks’ Unit 42 herausgefunden haben, können Kriminelle diese nutzen, um Schadcode in Metadaten zu verstecken. Einmal…
-
Flaw in AI Libraries Exposes Models to Remote Code Execution
3 Major Tech Firms Shipped Vulnerable Open-Source Tools to Hugging Face. Researchers discovered remote code execution vulnerabilities in three AI libraries from Apple, Salesforce and Nvidia used by models with tens of millions of Hugging Face downloads, allowing attackers to hide malicious code in model metadata. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/flaw-in-ai-libraries-exposes-models-to-remote-code-execution-a-30519
-
Popular Python libraries used in Hugging Face models subject to poisoned metadata attack
The open-source libraries were created by Salesforce, Nvidia, and Apple with a Swiss group First seen on theregister.com Jump to article: www.theregister.com/2026/01/13/ai_python_library_bugs_allow/
-
Apple confirms Google Gemini will power Siri, says privacy remains a priority
Apple and Google have confirmed that the next version of Siri will use Gemini and Google Cloud in a multi-year collaboration between the two tech giants. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/apple/apple-confirms-google-gemini-will-power-siri-says-privacy-remains-a-priority/
-
Investment Scam mit falscher Investoren-Community mittels KI
Sicherheitsforscher warnen vor neuartiger Betrugsmasche, bei der Opfer in eine vollständig gefälschte Anleger-Welt gelockt werden. Die verseuchte App ist noch immer im Apple App Store verfügbar. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/investment-scam-ki
-
Randall Munroe’s XKCD ‘Apples’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/01/randall-munroes-xkcd-apples/
-
Dems pressure Google, Apple to drop X app as international regulators turn up heat
“There can be no mistake about X’s knowledge, and, at best, negligent response to these trends,” the lawmakers wrote to company executives. First seen on cyberscoop.com Jump to article: cyberscoop.com/senators-ask-apple-google-remove-x-after-grok-ai-sexual-deepfakes/
-
Cyber-Betrüger bauen komplette Schein-Investoren-Community um ihre Opfer herum auf
Sicherheitsforscher von Check Point warnen vor einer neuen Masche, bei der Betrüger eine vollständig gefälschte Investoren-Community erschaffen, um Opfer zu berauben samt Anleger-App, Experten, und Chatrooms. Als Wirkverstärker kommt KI zum Einsatz. Die Experten sprechen sogar von industrialisiertem Social-Engineering. Die verseuchte App ist sogar noch im Apple-App-Store verfügbar. Check Point Software Technologies rät zur […]…
-
Cyber-Betrüger bauen komplette Schein-Investoren-Community um ihre Opfer herum auf
Sicherheitsforscher von Check Point warnen vor einer neuen Masche, bei der Betrüger eine vollständig gefälschte Investoren-Community erschaffen, um Opfer zu berauben samt Anleger-App, Experten, und Chatrooms. Als Wirkverstärker kommt KI zum Einsatz. Die Experten sprechen sogar von industrialisiertem Social-Engineering. Die verseuchte App ist sogar noch im Apple-App-Store verfügbar. Check Point Software Technologies rät zur […]…
-
OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls
Artificial intelligence (AI) company OpenAI on Wednesday announced the launch of ChatGPT Health, a dedicated space that allows users to have conversations with the chatbot about their health.To that end, the sandboxed experience offers users the optional ability to securely connect medical records and wellness apps, including Apple Health, Function, MyFitnessPal, Weight Watchers, AllTrails, First…
-
Logitech Options+, G HUB macOS apps break after certificate expires
Logitech’s Options+ and G Hub apps on macOS stopped working after their code-signing certificate expired, leaving users unable to launch them on Apple systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/hardware/logitech-options-plus-g-hub-macos-apps-break-after-certificate-expires/
-
Logitech Options+, G HUB macOS apps break after certificate expires
Logitech’s Options+ and G Hub apps on macOS stopped working after their code-signing certificate expired, leaving users unable to launch them on Apple systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/hardware/logitech-options-plus-g-hub-macos-apps-break-after-certificate-expires/
-
Logitech Options+, G HUB macOS apps break after certificate expires
Logitech’s Options+ and G Hub apps on macOS stopped working after their code-signing certificate expired, leaving users unable to launch them on Apple systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/hardware/logitech-options-plus-g-hub-macos-apps-break-after-certificate-expires/
-
Critical macOS Flaw Lets Attackers Bypass Apple Privacy Controls Without Consent
A newly disclosed macOS vulnerability bypasses Apple’s TCC privacy controls, allowing silent access to files, microphone data, and user activity. The post Critical macOS Flaw Lets Attackers Bypass Apple Privacy Controls Without Consent appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-macos-flaw-apple-privacy-controls/
-
Smart Lock U400 – Aqara bringt Türschloss mit Apple Home Key
Tags: appleAqara zeigt auf der CES neue Smart-Home-Geräte mit Matter, ein Thermostat mit iOS-26-Funktionen und ein UWB-Tüschloss mit Apple Home Key. First seen on computerbase.de Jump to article: www.computerbase.de/news/smart-home/smart-lock-u400-aqara-bringt-tuerschloss-mit-apple-home-key.95670
-
Apple Rolls Out iOS 26.3 Security Test to Beta Users
Tags: appleThe new Background Security Improvements system represents a dramatic shift from their previous approach. The post Apple Rolls Out iOS 26.3 Security Test to Beta Users appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-apple-ios-security-system-test/
-
macOS Flaw Enables Silent Bypass of Apple Privacy Controls
A macOS vulnerability (CVE-2025-43530) allows attackers to silently bypass TCC privacy controls and access sensitive user data. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/macos-flaw-enables-silent-bypass-of-apple-privacy-controls/

