This article is from Trend Micro.
Apple’s security headaches continue to pound. Researchers have recently found yet another threat. In this latest, hackers are able to trick users into allowing them to run commands remotely on macOS Big Sur.
It was discovered by independent expert, Park Minchan, and reported to the SSD Secure Disclosure program. They have this to say:
“A vulnerability in macOS Finder allows files whose extension is inetloc to execute arbitrary commands, these files can be embedded inside emails which if the user clicks on them will execute the commands embedded inside them without providing a prompt or warning to the user
[…]
If the inetloc file is attached to an email, clicking on the attachment will trigger the vulnerability without warning.”
While Apple has released a patch for this issue, it has subsequently been reported that it can easily be circumvented. SSD Secure Disclosure has notified Apple of this, but has yet to receive a reply. As such, until this vulnerability has been properly addressed macOS users should be extra vigilant when it comes to engaging with emails.
On the other hand, this is also simply part of a wider issue: that Macs are indeed vulnerable to attacks. In May, it was attackers being able to take screenshots on your Mac; in July, it was corrupted-memory systems being sitting-ducks for takeover; and just this month we’ve had the zero-clicks debacle. The evidence continues to pile up.
After several months of these Mac security issues coming to light, it should be clear by now that the old myth of Apple products not requiring third-party antivirus protection is untrue — and unsupported by the evidence we see every month.
Though this latest issue is up to Apple to fix, it would be remiss of us to not encourage you to download our free Antivirus One product for full protection. Its key features include:
Antivirus One is free, fast, and thorough. Try it now: you haven’t a thing to lose in quickly ramping up your defenses.
Have you fallen for a hoax, bought a fake product? Report the site and warn others!
As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a part of every facet of our lives. The below tips will help you identify the signs which can indicate that a website could be a scam. Common Sense: Too Good To Be True When looking for goods online, a great deal can be very enticing. A Gucci bag or a new iPhone for half the price? Who wouldn’t want to grab such a deal? Scammers know this too and try to take advantage of the fact. If an online deal looks too good to be true, think twice and double-check things. The easiest way to do this is to simply check out the same product at competing websites (that you trust). If the difference in prices is huge, it might be better to double-check the rest of the website. Check Out the Social Media Links Social media is a core part of ecommerce businesses these days and consumers often expect online shops to have a social media presence. Scammers know this and often insert logos of social media sites on their websites. Scratching beneath the surface often reveals this fu
How do I recover my crypto after it’s stolen? What happens if your crypto wallet is compromised? Can stolen crypto be traced, and can police actually recover crypto in 2026? These are the questions most people ask within minutes of realizing their wallet has been drained. Crypto theft is fast, quiet, and unforgiving. By the time most victims notice something is wrong, the funds are already moving across the blockchain. Once seen as a problem for exchanges and whales, crypto theft now heavily affects everyday investors. Phishing links, fake support chats, wallet approval scams, SIM swaps, and malware attacks have become common. Knowing what recovery realistically looks like—and what it doesn’t—can prevent panic, bad decisions, and costly follow-up scams. In a Nutshell Crypto recovery is possible, but only in limited situations Blockchain transactions are irreversible, but stolen crypto can still be traced Speed and documentation matter more than optimism Police and exchanges play a bigger role than private recovery services Guaranteed recovery offers are almost always scams Is it Actually Possible to Recover Stolen Crypto? Yes, crypto recovery is possible, but only under specific conditions and rarely through direct action by the victim. Blockchain transactions are final by design. Once crypto is sent and confirmed, it cannot be reversed. There is no central authority, no chargeback process, and no technical “undo” button, even if the transaction was clearly fraudulent. This is where many people ask whether stolen crypto can be traced. In most cases, it can. Every transaction