Mac users are kept: Threats of malicious software on AI on the rise are

Apple devices are believed to be quite safe and the company will tell you. You may have seen the “Privacy. It’s an apple. “In their promotions.
However, the technologically landscape changes, and even Apple products are not out of reach of Cyber -Kriminalians.
The new report suggests that Mac users will have to be more awake this year as AI progress helps hackers to violate even the safest systems. Imam Consistently reports on how Mac malicious software targets usersAnd experts now believe that it will only get worse.
Man who works on his laptop (Kurt “Cyberguy” Knutsson)
Rise Cyber -Finding on Apple Devices
Mac malicious software is not what it used to be. For years, the biggest threats have been unpleasant abduction of Adware and browser, which is more annoyance than a real danger. But that changes quickly. As pointed out MalwarebytesThey take on a new wave of stolen information and they are far more dangerous, they go for password, cookies to authenticate, credit card details, and even crypto currencies.
This shift began in mid -2023 by arriving Atomic stolenAlso known as Amos, a piece of malicious software that looked much more on Windows as something you would see from typical Mac threats. Amos was not just effective. It was easy to use and sell as a service for $ 1,000 a month with smooth internet control panels. This success led to an increase in even more dangerous variants.
What is artificial intelligence (AI)?
One of them, Pozeidonlaunched in mid -2024 and quickly became the dominant Mac stolen, responsible for 70% infections. It can drain more than 160 different wallets of cryptocurrencies, steal passwords from browser and password manager and even catch VPN credentials.
At the same time, Cyber -Criminals doubled malverUsing false ads on Google and Bing to deceive users to take over the malicious software instead of the actual software. These campaigns are highly targeted, allowing attackers to specify Mac users serve false downloads based on their searches. Because AI is now used to create and execute many of these attacks, it is likely to increase the scale.
A woman working on her laptop (Kurt “Cyberguy” Knutsson)
4.3 million Americans exhibited in mass health -saving of data violation
Things are up for Android users
While Mac malicious software develops, Android situation is even more alarming. Phrying attacks on the platform have reached stunning levels, with thousands of malicious applications designed for credentials and bypassing security measures.
So far, 2024 researchers have discovered 22,800 applications that can be monitored, together with 3,900 applications designed to read OTP with notification and 5,200 applications that can draw OTP from SMS messages. These numbers point out that it has become a widespread and effective malicious Android Phishing software.
Just like e-mails with stealing fishing, phishing applications transfer users to hand over their usernames, passwords and two-focal codes to authenticate. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyber -finished. Since identity stealing apps require minimal code and smaller permits than traditional malicious software, it is much easier to pull into the app stores, including Google Play.
Many identity stealing apps look like a regular, completely functional software. Some impersonal games or service programs, while others appear as cracked versions of popular applications such as Tiktok, WhatsApp or Spotify. Some remain sleepy for days to avoid discovering before they start their attacks. Others rely on the functionality of ADs in order for users to divert to websites with identity theft, making a malicious code harder to monitor.
Google Play Protect, what is Built -in protection of malicious software For Android devices, automatically removes the famous malicious software. However, it is important to note that Google Play Protect may not be enough. Historically, it is not 100% stupid in removing all the famous malicious software from Android devices.
Get a job with Fox on a clicking movement here
A woman working on a desktop and a laptop (Kurt “Cyberguy” Knutsson)
A massive security flaw puts the most popular browsers on Mac
5 tips to protect your devices from malicious software
Follow these essential tips to protect your devices from the latest threats of malicious software, including the infamous info stolen malicious software.
1. Have a strong antivirus software: The best way to protect yourself from malicious connections installed by malicious software, potentially access to your private data, is to install a strong antivirus software on all your devices. This protection can also alert you of phishing e -Mail and fraud from Ransomware, keeping your personal information and digital assets. Get my elections for the best winners to protect against antivirus 2025 for your Windows, Mac, Android and iOS devices.
2. Be careful with downloads and connections: Download software from distinguished sources such as Mac App Store, Google Play Store or Official Substantial Website. Be careful about unwanted E -mail or messages that encourage you to download or install updates, especially if they contain connections. Attempts to theft of identity They are often disguised as legitimate update or emergency notifications.
3. Notify your software: Ensure that both Macos, Android and all installed applications are updated. Apple and Android often post security patches and updates that deal with vulnerability. Enable automatic updates for Macos, Android and your applications to stay protected without manually checking updates. If you need more help you look at my A guide to update all your devices.
4. Use strong and unique passwords: To protect Mac from malicious software, it is also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords on different web locations or services. AND password manager It can be incredibly useful here. It generates and stores complex passwords for you, making it difficult for them to hackers.
Also follow all your passwords in one place and automatically fill them in when you log in to your accounts so you don’t have to remember them yourself. By reducing the number of passwords you have to remember, you are less likely to reuse them, which reduces the risk of security violation. Get more details about my Best reviewed password managers from 2025 here.
5. Use a two -factor authentication (2FA): Enable 2fa For your important accounts, including your Apple ID, Google Account, E -Cost and all financial services. This adds an additional step in the application procedure, which makes it difficult for the attackers to access, even if they have your password.
How to remove your private information from the Internet
Kurts key endeavor
The days when MAC users could assume that they were safe for a long time, they disappeared. Cyber-Kriminalians develop their tactics, with Mac malicious software switches from a simple Adware to advanced stolen information. Android phishing applications also become more difficult to detect and widespread than ever before. From the theft of passwords and cookies to authenticate to intercept the OTPSA drainage of the cryptocurrency of the cryptocurrency, these threats grow and in sophistication and in the scale. No platform is immune, and as Cyber -criminals continue to improve their techniques, users and organizations must remain forward with strong safety measures.
Click here to get the Fox News app
Do you believe official app stores like the App Store -Google Play or do you think they need to do more to prevent malicious software? Let us know by writing us on Cyberguy.com/contact
For more of my technological tips and security warnings, subscribe to my free newsletter about Cyberguy Report, moving toward Cyberguy.com/newslettter
Ask the Kurt question or let us know which stories would you like to cover
Follow Kurt on his social channels
Answer to Cyberguya’s most needed questions:
New from Kurt:
Copyright 2025 Cyberguy.com. All rights reserved.