A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more business users and IT staff are seeing why the Mac platform is a good fit for their organization. Apple devices
The CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.
Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.
Google has expanded its Safe Browsing service, allowing Google Chrome on macOS to better protect users from programs that locally inject ads into web pages or that change the browser's home page and search settings.
The Center for Internet Security (CIS) benchmark for OS X is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. This white paper from JAMF Software-the Apple Management Experts-will show you
As iPad and iPhone usage continues to grow in enterprises around the world, are you grappling with how to deploy, inventory, and secure iOS devices in your environment? In this e-book, you'll learn how to manage iPad and iPhones.
Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian hackers to target the U.S. defense industry.