dcsimg

Windows 7 is EOL: What next?

End-of-life (EOL) is an expression commonly used by software vendors to indicate that a product or version of a product has reached the end of usefulness in the eyes of the vendor. Many companies, including Microsoft, announce the EOL dates for their products far in advance. Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it’s no longer … [Read more...]

Mac adware is more sophisticated and dangerous than traditional Mac malware

As the data revealed in our State of Malware report showed, Mac threats are on the rise, but they are not the same type of threats experienced by Windows users. Most notably, more traditional forms of malware, such as ransomware, spyware, and backdoors account for over 27 percent of all Windows threats. That figure is less than 1 percent for Macs. Further, Mac malware is rather unsophisticated … [Read more...]

Malwarebytes Labs releases 2020 State of Malware Report

Malwarebytes Labs today released the results of our annual study on the state of malware—the 2020 State of Malware Report—and as usual, it’s a doozy. From an increase in enterprise-focused threats to the diversification of sophisticated hacking and stealth techniques, the 2019 threat landscape was shaped by a cybercrime industry that aimed to show it’s all grown up and coming after … [Read more...]

Adding Many Full-Size Icons to the Mac Dock

I use the Mac Dock a lot, and I configure it to have the most useful set of icons that I can. Unfortunately, when you add lots of icons to the Dock, the icons become tiny. In this blog post, I will show you how I add many full-sized icons to my Dock. You can see what the end result is in Figure 1. Figure 1_Nine full-sized icons for Windows app in the Mac Dock The trick here is to add … [Read more...]

How to Use Hyper-V Virtualization on Mac Computers

Virtualization plays a major role in many businesses, though this may not always be immediately apparent to users. Increasingly, the applications they work with will not be running on tangible hardware but rather on virtualized systems. Software developers can also make good use of such virtual machines (VMs).   Microsoft has long embraced this virtualization technology and offers … [Read more...]

Mac threat detections on the rise in 2019

Conventional wisdom has been that, although not invulnerable to cyberthreats (as some old Apple ads would have you believe), Macs are afflicted with considerably fewer infections than Windows PCs. However, when reviewing our 2019 Mac detection telemetry, we noticed a startling upward trend. Indeed, the times, they are a-changin’. To get a sense of how Mac malware performed against all … [Read more...]

Sidecar and Parallels Desktop 15 for Mac

I’ve been using macOS® Catalina since the day it was publicly announced on June 4, 2019. That evening I had the first developer preview of Catalina running in a virtual machine (VM) in Parallels Desktop® 15 for Mac. While Catalina has many interesting features, the one I find most useful is Sidecar. Sidecar enables you to use an iPad® as a secondary screen on your Mac®. Figure 1 shows a midway … [Read more...]

New iOS exploit checkm8 allows permanent compromise of iPhones

This morning, an iOS researcher with the Twitter handle @axi0mX announced the release of a new iOS exploit named checkm8 that promises to have serious consequences for iPhone and iPad hardware. According to the Tweet, this exploit is a “permanent unpatchable bootrom exploit,” capable of affecting devices from 4S up to the iPhone X. But what, exactly, does this mean? First, … [Read more...]

Unprecedented new iPhone malware discovered

A post by Ian Beer of Google Project Zero released late yesterday evening sent the security community reeling. According to Beer, a small set of websites had been hacked in February and were being used to attack iPhones, infecting them with malware. These sites, which see thousands of visitors per day, were used to distribute iOS malware over a two-year period. History of iOS … [Read more...]

A week in security (July 8 – 14)

Last week on Malwarebytes Labs, we looked at ways to send your sensitive information in a secure fashion, examined some tactics in incident response land, and explored federal data privacy law. We also looked at how security tools can turn against you, and took a deep dive into the rather fiendish Soft Cell attack. Other cybersecurity news The UK government backs facial recognition tech: The … [Read more...]