Apple has a new brilliant way to stop hackers from spying through your laptop

Apple’s MacOS is known to be one of the more secure operating systems out there. However, due to its increasing popularity and expanding user base, hackers and cybercriminals are starting to victimize iMacs and MacBooks more and more.

By accessing a computer’s microphones and cameras, hackers are awarded an open window into your life. They can spy on you at any time, without warning, recording your personal and professional footage.

This information can be used in a variety of ways, but commonly, images and conversations from an individual’s private life are held ransom, and subsequently released online to the world if the ransom demand is not met.

Thankfully, with the just-announced new MacBook Air, Apple made it much tougher to hijack its microphone.

New T2 security chip

A recently published Apple security document detailing the new MacBook Air’s T2 chip has revealed a brilliant new feature that protects its microphone from hijacking and spying.

With this feature, any T2-equipped laptop will disconnect the microphone whenever the lid is closed.

The idea is that since this disconnection is physically executed via hardware, malware and other software hacks can’t bypass it.

“This disconnect is implemented in hardware alone, and therefore prevents any software, even with root or kernel privileges in macOS, and even the software on the T2 chip, from engaging the microphone when the lid is closed,” Apple wrote in the overview.

The MacBook Air’s camera, on the other hand, doesn’t get the same hardware disconnect feature since its view is already obstructed anyway when the lid is closed. Makes sense to me.

Other T2 security features:

Other security features detailed in the paper include the following:

Continue reading

This wireless security camera has a serious hijacking flaw

Web-connected cameras can be great security and monitoring tools that can keep your home safe. With a smartphone or a computer, these cameras allow you to view their live feeds over the internet, essential for home security, surveillance or for keeping an eye on children or pets. Cybercriminals also love them, which is why you need to know how hackers can get into your home security cameras.

Continue reading

Is your phone safe? Hackers can easily hijack it and steal your information

Open/download audioYour phone is your most prized possession, making it the most vulnerable security risk you own. Did you know that hackers are able to access nearly all your accounts with just your phone number? In this episode of Komando on Demand, Kim explores the serious threat of hijacking smartphones and how cybercriminals can ruin your life. Founder and CEO of InForceCyber.com Asen Kehayov, who is a Certified Ethical Hacker from Bulgaria, advises on what people can do to safeguard their data.

Learn more about your ad choices. Visit megaphone.fm/adchoices

3 security programs that should be on every computer and laptop

The digital world can be a scary place. There are cybercriminals from every corner of the world looking to steal our credentials, rip us off, and cause all kind of chaos. Malware, ransomware, and phishing attacks are just a few examples of threats that we need to be wary of. Scammers behind these attacks have no scruples and will use every tool in their playbook to find new victims.

Continue reading

Browse anonymously online with this free, secure network

Continue reading

12 questions you're too embarrassed to ask about Bitcoin

Bitcoin mania made headlines in the media. But many people don’t have a clue what a Bitcoin is. If you don’t know much about them, don’t be embarrassed, it’s confusing and pretty new to the mainstream. I’m here for you and I put together a list of 12 questions that will give you a much better understanding of this popular cryptocurrency.

Continue reading

How likely is it your Amazon Echo will be hacked? You'll be surprised by the answer

Smart speakers with virtual assistants like the Amazon Echo and the Google Home have opened our eyes (and ears) to what an always-on, always-listening appliance can do. But with all this convenience, an always-listening gadget will always raise privacy and cybersecurity concerns. What if a clever hacker finds a flaw that can turn these smart speakers into secret spy gadgets? But then again, how likely is it a massive smart speaker attack like this will happen?

Continue reading

Email spam is surging - here's how to protect yourself

If you’ve ever dreaded giving out your email address, here’s a way to create a fake, temporary and disposable email address to ensure your personal security and save your sanity.

Continue reading

6 mistakes that put you at risk for identity theft

How to block potentially harmful programs with Windows Defender Antivirus

Sneaky iOS scam spreading now

Crooks are constantly on the lookout for opportunities to trick you into forking over some of your hard-earned cash. Once people get wise to their tricks, scammers tweak them to become even more deceptive. And their creativity knows no bounds. Take this tricky new iPhone scam that’s currently making the rounds. It’s so cleverly done, you might fall for it if you’re not careful.

Continue reading

Gmail redesign could put over a billion people at risk

Dark Web Alert! If someone died in your family, clever thieves are out in full force

When it comes to personal data, cybercriminals know no limits. As long as there’s some potential profit involved, these scammers will try anything just to earn a quick buck. Identity theft is a big and thriving underground business in the black market. Why? Millions of Americans have their identities stolen every year, and not surprisingly, it’s the fastest-growing crime in the U.S. Well, it turns out, hackers are not only preying on the living, they’re targeting the dead, too!

Continue reading

Malware hitting some of Amazon's best-selling products

10 insider ways to keep hackers and scammers away from your private files

Cybercriminals are always looking for ways to steal your personal data. We’ve seen a huge uptick in the number of data breaches over the past few years. It’s not always your information that the criminal is after though. Sometimes the thief is just looking to steal your gadget, for either personal use or to sell for profit.

Continue reading

3 ways scammers are using ATMs to steal from you

Other than our home, the place that it’s most important to feel safe is our financial institutions. Having your bank account or credit/debit cards breached is a horrifying thought. Imagine trying to make a purchase one day only to find out that your checking account has been drained. Yikes! It’s not just cybercriminals that we need to be wary of going after our accounts. There are also ATM scammers out there ripping off anyone who dares to use one of these cash machines.

Continue reading

North Korea is spying by using your Google Play apps

New Adobe PDF bug can get you hacked with just one click

Do you view PDF documents all the time? Chances are, you are using Adobe’s PDF program, Adobe Acrobat Reader to open and read them. Beware! Security researchers from Cisco Talos have recently newly discovered bugs in Acrobat Reader that can allow hackers to take control of your computer with a single click of a booby-trapped PDF!

Continue reading

5 must-do spy hacks you need to use now

Privacy and security seem to be on everyone’s mind today. Which makes sense, because cybercriminals are constantly on the attack.

It doesn’t matter if you’re waiting for a connecting flight at the airport or in the comfort of your own home, hackers will find you. They might be watching your every move over public Wi-Fi or trying to get an up close and personal look at you through your webcam.

Continue reading

Watch out! Clever spyware is spreading on porn sites