Tag: Macintosh

Beware of the Malicious Mac Monero Miner

Malicious cryptocurrency mining tools have become a big problem over the past few months. In most cases, this malware only affects Windows users, although some Linux variants exist as well. It seems a stealthy Macintosh cryptominer has been utilizing the XMRig source code to mine Monero on behalf of criminals. A Malicious Mac Cryptominer Appears For the most part, users of the Macintosh operating system have been safe from harm in regards to malware …
[Read More]

4 Macintosh Applications to Track Cryptocurrency Prices

Macintosh users have a bit of a difficult time to keep track of all cryptocurrency movements. They can open a browser window just like anyone else, but using an app to keep tabs on different currencies and price movements has been always a more pleasant experience. Luckily, there are quite a few applications at their disposal. The following Macintosh apps are well worth checking out for any cryptocurrency enthusiast who also …
[Read More]

DevilRobber Cryptocurrency Miner is the Second Most Popular Malware on Macintosh

We have another development in Macintosh malware. While Macintosh users do have fewer threats to worry about than Windows users, it does not mean they are impervious to attack. The second most popular malware plaguing the operating system is a cryptocurrency miner. Cryptocurrency Mining and Malware We have seen multiple iterations of cryptocurrency mining malware over the past few years. Virtually all of these tools are designed to infiltrate Windows …
[Read More]

Two New Macintosh Malware Threats Have Been Identified

Macintosh users have another cyber threat to worry about. It seems cybercriminals have taken a liking to exploit MacOS vulnerabilities these past few months. Two new strains of Mac OS X malware have been discovered, both of which are distributed through malware-as-a-service products on the darknet. One strain is a ransomware variant, whereas the other seems to spy on users in order to obtain sensitive information and login credentials. Two New …
[Read More]