Tag: users

  • Mac users beware: AI-powered malware threats are on the rise

    Mac users beware: AI-powered malware threats are on the rise

    Apple devices are believed to be pretty secure, and that’s what the company will tell you. You might have seen the tagline “Privacy. That’s Apple.” in their promotions. 

    However, the tech landscape is changing, and even Apple products aren’t beyond cybercriminals’ reach. 

    A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I have consistently reported on how Mac malware is targeting users, and experts now believe this will only get worse.

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    A man working on his laptop   (Kurt “CyberGuy” Knutsson)

    The rise of cyberattacks on Apple devices

    Mac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted by Malwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency.

    This shift started in mid-2023 with the arrival of Atomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service  for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    One of them, Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials.

    At the same time, cybercriminals have doubled down on malvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale.

    woman on laptop

    A woman working on her laptop   (Kurt “CyberGuy” Knutsson)

    4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

    Things are worse for Android users

    While Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures.

    So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become.

    Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play.

    Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace.

    Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    woman working on desktop

    A woman working on a desktop and laptop computer   (Kurt “CyberGuy” Knutsson)

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    5 tips to protect your devices from malware

    Follow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware.

    1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

    3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

    4. Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack. 

    It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2025 here.

    5. Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    Kurt’s key takeaways

    The days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover

    Follow Kurt on his social channels

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com.  All rights reserved.

  • PlayStation Network experiences significant outage, impacting hundreds of thousands of online users

    PlayStation Network experiences significant outage, impacting hundreds of thousands of online users

    Sony’s PlayStation Network (PSN) experienced a significant outage on Friday and Saturday, impacting hundreds of thousands of gamers across the world and frustrating users reliant on its online system.

    PlayStation confirmed the outage in an X post on Friday evening. As of Saturday afternoon, users were still reporting network outages, and over 100,000 users have reported issues on Downdetector.com.

    Reported issues include difficulty connecting to an online server, difficulty accessing the PlayStation online store and an inability to log in.

    “We are aware some users might be currently experiencing issues with PSN,” the company’s post, which received 56,000 likes, read.

    MICROSOFT TO BRING CALL OF DUTY TO NINTENDO IN 10-YEAR DEAL

    The last major PlayStation outage took place in May 2011, when servers were down for a few weeks due to a security breach. Over 51,000 X users replied to the company’s latest update, with thousands of users in Europe and North America venting about the outage.

    “Still down in California,” one X user said on Saturday.

    “An update please? Been hours,” another wrote on Friday night.

    “This is why ZERO games should need online status to play,” another wrote.

    Other social media users expressed frustration about the cost of PlayStation Plus, which ranges from $80 to $160 a year and gives users access to online gameplay. The newest PlayStation console, the PlayStation 5 Pro, also retails for over $700.

    MICROSOFT BID FOR ACTIVISION LIKELY TO BE BLOCKED BY FTC LAWSUIT: REPORT

    “Imagine buying a PS5 Pro for $800 and you can’t even play it,” a commentator wrote.

    “So is playstation going to refund people who paid for psn?” another said.

    PlayStation has received scrutiny for its prices in the past. In 2023, a London tribunal ruled that Sony must face a $8 billion lawsuit over allegations that it charged “excessive prices” on the PlayStation Store.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    “This is the first step in ensuring consumers get back what they’re owed as a result of Sony breaking the law,” Alex Neill, a consumer advocate involved in the lawsuit, said at the time. “PlayStation gamers’ loyalty has been taken advantage of by Sony who have been charging them excessive prices for years.”

    FOX Business reached out to PlayStation for comment.

  • OpenAI’s ChatGPT briefly goes down for users across the globe

    OpenAI’s ChatGPT briefly goes down for users across the globe

    ChatGPT users around the globe were reportedly experiencing issues with the OpenAI chatbot late Wednesday. 

    According to Down Detector, users began reporting problems at OpenAI around 8:30 p.m. 

    The San Francisco-based company said it was investigating the issues as users from Japan to Australia were reporting issues. 

    Around 15 minutes later, the company said it was “starting to see recovery in API and Sora,” adding: “We are continuing to investigate this issue.” 

    PERPLEXITY AI BIDS ON TIKTOK, CEO SAYS IT’S A WIN-WIN FOR TRUMP

    The Open AI logo, which represents the American-based artificial intelligence (AI) research organization known for releasing the generative chatbot language model AI ChatGPT and initiating the AI spring, is being displayed at the Mobile World Congres (Joan Cros/NurPhoto via Getty Images / Getty Images)

    The issue appeared to be resolved just before 12 a.m. EST. A company spokesperson told FOX Business after midnight: “All systems are currently operational.” 

    ChatGPT AI Photo Illustration

    The ChatGPT logo appears on a smartphone screen in this illustration photo in Reno, United States, on January 3, 2025.  (Jaque Silva/NurPhoto via Getty Images / Getty Images)

    OpenAI responded to a major outage on ChatGPT and other applications in late December. The company said the issue had been caused by an upstream provider, which is a company that connects to a local internet service provider’s network to the internet. 

    TRUMP’S AI CZAR FLAGS REPORT QUESTIONING DEEPSEEK’S COST OF DEVELOPING AI MODELS

    OpenAI ChatGPT

    In this photo illustration, the OpenAI logo is seen displayed on a mobile phone screen with ChatGPT logo in the background.  (Photo Illustration by Idrees Abbas/SOPA Images/LightRocket via Getty Images / Getty Images)

    Wednesday night’s outage comes a day after the company said it was rolling out an education-specific version of its chatbot to around 500,000 students and faculty at California State University as it looks to expand its user base in the academic sector and counter competition from rivals like Google’s Alphabet. 

    CLICK HERE TO GET FOX BUSINESS ON THE GO

    Reuters contributed to this report. 

  • Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    Apple’s Macs are generally considered more secure than Windows PCs, but they are not immune to hackers. Numerous incidents demonstrate that Macs are not impenetrable, and a new one has recently been added to the list. Security researchers have discovered a new variant of stealer malware that targets browser credentials, cryptocurrency wallets and other personal data. I reported on this malware in 2024 as well. Previously, it relied on macOS browser extensions to steal data. Now, it uses phishing websites and fake GitHub repositories to target Macs, which have a user base of 100 million people.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Enter the giveaway by signing up for my free newsletter.

    A person working on their Apple laptop (Kurt “CyberGuy” Knutsson)

    The evolution of info-stealer Mac malware

    Cybersecurity company Check Point has discovered a new variant of info-stealer malware, BanShee. Elastic Security Labs first highlighted this malware in mid-2024, noting that it operates as malware-as-a-service, a business model in which cybercriminals provide access to malicious software and related infrastructure for a fee. At that time, it was available for as much as $3,000 per month.

    Check Point says this malware evolved in September after being exposed. This time, its developers had “stolen” a string encryption algorithm from Apple’s own XProtect antivirus engine, which replaced the plain text strings used in the original version. Since antivirus programs expect to see this kind of encryption from Apple’s legitimate security tools, they weren’t flagged as suspicious, allowing the BanShee to remain undetected and quietly steal data from targeted devices.

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    A woman working on her Apple desktop and Apple laptop (Kurt “CyberGuy” Knutsson)

    4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

    How the Mac malware operates

    BanShee Stealer is a prime example of how advanced malware has become. Once it’s on a system, it gets straight to work stealing all kinds of sensitive information. It goes after data from browsers like Chrome, Brave, Edge and Vivaldi, as well as cryptocurrency wallet extensions. It even takes advantage of two-factor authentication (2FA) extensions to grab credentials. On top of that, it collects details about the device’s software and hardware, as well as the external IP address.

    The Mac malware also tricks users with fake pop-ups that look like real system prompts, tricking victims into entering their macOS passwords. Once it has gathered the stolen information, BanShee exfiltrates it to command-and-control servers, using encrypted and encoded files to ensure the data remains secure.

    The malware’s creators used GitHub repositories to spread BanShee. They set up fake repositories that looked like they hosted popular software, complete with stars and reviews, to seem trustworthy. These campaigns didn’t just target macOS users with BanShee. They also hit Windows users with a different malware called Lumma Stealer. Over three waves, the attackers used these fake repositories to trick people into downloading their malicious files.

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    A woman working on her laptop (Kurt “CyberGuy” Knutsson)

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    5 tips to protect yourself from Mac malware

    Follow these essential tips to safeguard your Mac from the latest malware threats, including the notorious BanShee Stealer.

    1) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    2) Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

    3) Keep your software updated: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

    4) Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here; it generates and stores complex passwords for you, making them difficult for hackers to crack.

    It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed password managers of 2025 here.

    5) Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    Kurt’s key takeaway

    No device is immune to cyberattacks when a human operator is involved. Take the BanShee Stealer, for example. It managed to target Macs not due to weak cybersecurity measures by Apple but because it successfully tricked users into installing it and granting the required permissions. Most breaches, hacks and other cyberattacks stem from human error. This highlights the importance of maintaining basic cybersecurity hygiene. It’s crucial to know what you’re downloading, ensure it’s from a trusted source and carefully review the permissions you grant to any online service or application.

    When downloading new software, how do you determine if it’s safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2024 CyberGuy.com. All rights reserved.

  • Soft robotic armband gives prosthetic hand users natural control

    Soft robotic armband gives prosthetic hand users natural control

    Prosthetic hands have long struggled to replicate the dexterity and functionality of natural hands, often limiting users to a single grasp function at a time. 

    This limitation has made everyday tasks, such as typing on a keyboard or braiding hair, challenging for those who rely on prosthetics. 

    However, a groundbreaking study from Florida Atlantic University (FAU) offers promising advancements that could transform the experience of prosthetic hand users.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Man sporting wearable soft robotic armband (Florida Atlantic University)

    New technology enables users to grasp two objects at once

    Researchers at FAU’s College of Engineering and Computer Science, in collaboration with the Charles E. Schmidt College of Science, conducted an innovative study that combined haptic feedback, electromyogram control and a wearable soft robotic armband. This study aimed to investigate whether users could control grip forces applied to two different objects simultaneously with a dexterous artificial hand.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The study’s findings, published in Scientific Reports, demonstrated that multiple channels of haptic feedback allowed participants to successfully grasp and transport two objects at once without dropping them, even when visual feedback was obstructed.

    For example, participants managed to pinch a card between their fingers while simultaneously unscrewing a water bottle lid or toggling a light switch with their little finger.

    prosthetic hand 2

    Prosthetic robot hand (Florida Atlantic University)

    NEW PROSTHETICS RESTORE NATURAL MOVEMENT VIA NERVE CONNECTION

    Multichannel soft robotic armband

    A key innovation in this research was the development of a multichannel soft robotic armband designed to convey artificial sensations of touch. This armband included soft actuators that provided proportional contact force feedback and vibrotactile stimulators that alerted users if they were about to drop or break an object. The armband’s design allowed it to deliver haptic feedback at three critical points corresponding to the thumb, index and little fingers, effectively enhancing the user’s ability to control multiple objects simultaneously.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    Participants in the study reported that haptic feedback was significantly more important than visual feedback, especially since visual cues often failed to indicate when an object was about to be lost. This insight underscores the necessity of integrating tactile sensations into prosthetic technology.

    prosthetic hand 3

    Prosthetic robot hand (Florida Atlantic University)

    BREAKTHROUGH PROSTHETIC FINGERS REVOLUTIONIZE THE LIVES OF AMPUTEES

    Implications for future prosthetic design

    The implications of this study extend beyond immediate user benefits; they suggest a paradigm shift in how prosthetic hands could be controlled in the future. By enabling refined dexterous control through enhanced sensory feedback, this research opens new pathways for individuals with upper limb loss to engage in complex tasks traditionally deemed impossible with current prosthetics. This includes activities such as playing musical instruments or performing intricate surgical procedures.

    In addition, the researchers noted that participants with limb loss performed as well as able-bodied subjects in key performance metrics during the tasks. This finding is particularly encouraging for clinical applications and indicates that advancements in technology can bridge gaps in functionality for users.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    prosthetic hand 4

    Prosthetic robot hand (Florida Atlantic University)

    COULD THESE EXOSKELETON ‘POWERED PANTS’ MAKE OUTDOOR ACTIVITIES EASIER IN THE FUTURE?

    Kurt’s key takeaways

    As researchers continue to refine these prosthetic technology systems, we may soon see prosthetic hands that not only replicate but exceed the capabilities of natural hands, empowering users to reclaim their independence and engage fully in both everyday activities and specialized tasks. This innovative approach not only addresses existing limitations but also paves the way for future developments in assistive technologies for individuals with disabilities.

    What personal experiences or stories do you have related to the use of prosthetics or assistive devices? Let us know by writing us at Cyberguy.com/Contact.

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.