Phishing Campaign Targets Mac Users
This is a news story, published by BGR, that relates primarily to Mac news.
Mac news
For more Mac news, you can click here:
more Mac newsNews about operating systems
For more operating systems news, you can click here:
more operating systems newsBGR news
For more news from BGR, you can click here:
more news from BGRAbout the Otherweb
Otherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best tech news, business news, entertainment news, and much more. If you like this article about operating systems, you might also like this article about
Microsoft security alerts. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest scam notifications news, attack page news, news about operating systems, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
new online scamBGR
•Technology
Technology
A Windows phishing campaign made its way to Mac - here's how to protect your data

52% Informative
A phishing campaign that had been targeting Windows users for several months has been remade for Mac computers.
LayerX Labs says this is one of the most sophisticated phishing campaigns on the Mac to date.
The hackers wait for people to misspell website names to try to steal their credentials.
They maintain the illusion of legitimacy by using Windows[.]net infrastructure.
VR Score
38
Informative language
26
Neutral language
49
Article tone
informal
Language
English
Language complexity
53
Offensive language
possibly offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
detected
Time-value
short-lived
External references
3
Source diversity
2