A toast to Apple’s littlest Mac as it turns 21
Macworld At Macworld Expo in January 2005, miniaturization was on Steve Jobs’s mind. Since the world was in the midst of iPod fever, most of the focus was on the tiny iPod Shuffle. But 21…
Macworld At Macworld Expo in January 2005, miniaturization was on Steve Jobs’s mind. Since the world was in the midst of iPod fever, most of the focus was on the tiny iPod Shuffle. But 21…
I had a good time last week digging through OS adoption data and recreating my glory days as a high-school mathematician. But the numbers are decidedly less fun for Tim Cook. According to research by…
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin…
Jan 12, 2026Ravie LakshmananArtificial Intelligence / Healthcare Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health…
Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. At least since 2016, Chinese-speaking criminal groups have erected…
Instagram says that although some users received suspicious-looking password reset requests, it has not been breached. That seemingly contradicts a Friday Bluesky post from antivirus software company Malwarebytes, which shared a screenshot of an email…
Jan 10, 2026Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based…
Jan 10, 2026Ravie LakshmananCybercrime / Financial Crime Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international criminal organization called Black Axe. As part of…
Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed…
Last year was a significant one for Apple’s operating systems. Across the board, from the iPhone and iPad to the Mac and Vision Pro, platforms were standardized in both version number and look. But not…