Technology
North Korean hackers use disguised apps to target Macs with hidden malware
Macs are safer than Windows PCs, but they’re not foolproof. Hackers occasionally find ways to infect Apple devices, and in most cases, we’re the ones who allow it. Since infiltrating Apple’s App Store is difficult, hackers trick people into downloading apps from third-party stores or random websites.
These apps look legitimate but are actually tools for infecting devices with malicious software. A recent incident highlights this issue, with North Korean hackers targeting Macs by hiding malware in seemingly harmless macOS apps.
I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.
A person working on their Mac (Kurt “CyberGuy” Knutsson)
How does the malware work?
Recent discoveries by Jamf Threat Labs have unveiled a sneaky form of malware targeting macOS computers. While it may sound technical, understanding the basics of how this malware operates can help you stay safe online.
This malware hides in seemingly harmless applications, such as a game called Minesweeper and a note-taking app referred to as a Notepad. These apps function as expected, but behind the scenes, they run malicious programs that could allow hackers to take control of your computer.
The apps use a technology called Flutter, a tool often used to create apps that work on multiple devices like phones and computers. Flutter makes it easier for app developers to design their software, but its unique structure also helps hackers hide their malicious code, making it harder for experts to detect.
Once installed, the malware connects to a remote server (think of it as a command center for hackers) to receive instructions. These instructions could include running commands on your computer without your knowledge. One trick this malware uses is running AppleScripts, a type of script built for macOS systems, which can quietly execute commands to steal your data or even control your device.
Even scarier, some versions of this malware had been signed and approved by Apple’s security system before experts caught on. This means the hackers were testing how far they could push their schemes without raising suspicion.
A woman working on different Apple devices (Kurt “CyberGuy” Knutsson)
4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH
The North Korea connection
This malware isn’t just a random act of cybercrime, it has ties to tactics and techniques often associated with North Korean hackers. Experts have identified similarities between this malware and previous attacks linked to North Korea, including the use of certain coding methods and domains that the country’s cyber teams are known to exploit.
North Korea has a history of using cyberattacks to fund its operations or disrupt systems worldwide, often targeting financial systems or vulnerable individuals. In this case, the malware seems to be in the testing phase, potentially laying the groundwork for a larger attack in the future.
The apps containing the malware were designed to look harmless. These tactics suggest a focus on tricking people through social engineering, a method North Korean hackers have used in the past.
By embedding the malware within apps that appear useful or fun, the attackers can increase the chances of someone downloading and using the infected software. While this particular malware has not yet been linked to active attacks, its connection to North Korea’s cyber playbook is a strong indicator of potential risks ahead.
A woman working on her laptop (Kurt “CyberGuy” Knutsson)
MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC
5 tips to protect yourself from Mac malware
1) Use reliable antivirus software: A strong antivirus program is your first line of defense against malicious links and malware that could steal your private information. Avoid clicking on random links, especially in emails or messages that claim to be urgent or demand updates. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. It can also warn you about phishing emails and ransomware scams, helping to keep your personal data and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2) Be careful with downloads and links: Only download apps from trusted sources like the Mac App Store or official websites of known developers. Hackers often disguise malware as legitimate updates or harmless apps.
3) Keep your software up to date: Regular updates for macOS and installed apps are essential because they patch security flaws. Apple frequently rolls out updates to address vulnerabilities, so enabling automatic updates ensures you stay protected without the hassle of manually checking for them.
4) Use strong, unique passwords: A strong password can help keep your Mac safe from unauthorized access. Avoid reusing passwords across different accounts. A password manager can be incredibly helpful here—it generates and stores complex passwords for you, making them difficult for hackers to crack.
It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2024 here.
5) Enable two-factor authentication (2FA): Activate 2FA for key accounts like your Apple ID, email, and financial services. This adds a second layer of security, making it much harder for attackers to access your accounts—even if they have your password.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Kurt’s key takeaway
I’ve noticed a significant rise in malware hiding in seemingly harmless apps, whether it’s related to Mac, Windows, Android, or even iPhones. It just shows that no device is completely safe, not even one made by Apple. Hackers, including those backed by North Korea, are constantly finding new ways to trick users into downloading malicious software. These attacks often fly under the radar because they look like regular, safe apps. With these threats becoming more sophisticated, it’s more important than ever to stay aware of the risks and be cautious about what you download and click on.
Do you trust third-party app stores or only use official app marketplaces? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions: New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Soundcore new Space 2 promise improved ANC and sound
We finally have an update to the Soundcore Space One that launched two and a half years ago. At MWC 2026, Soundcore has announced the Space 2, which will be available in the US on April 21st in three colors — linen white, jet black, and seafoam green — for $129.99. That’s $30 more than the Space One’s original price.
According to Soundcore, the Space 2 have had a full-band noise cancellation upgrade with the focus of those improvements on the low-frequency sounds we all generally use ANC headphones to block — things like airplane, train, and bus engine sounds while traveling. The Space 2 use the same number of microphones as the Space One for noise canceling, instead relying on optimized mic placement and structure and materials improvements for the boost in performance.
Redesigned 40mm drivers incorporate dual layers in their design. There’s a silk diaphragm with metal ceramic that supposedly results in faster transient response — the driver’s ability to respond to sudden sound quickly and accurately — with better balanced sound reproduction. The Space One had great sound performance for the price, but I’m all for any improvement to sound performance accuracy. Like the Space One, the Space 2 will support LDAC high-res audio.
The headphones connect wirelessly over Bluetooth 6.1, although they do not support Auracast transmissions — an unfortunate exclusion. There’s also a 3.5mm jack for a wired connection.
Battery life has been increased to up to 50 hours with ANC and 70 hours with ANC off. This is up from 40 hours with ANC and 55 hours without ANC with the Space One headphones. With a five-minute charge the Space 2 get an additional four hours of listening.
The Space 2 will include many of the features found on the Space One. You can use HearID 3.0 to go through a series of sound samples to tune the headphones’ sound to your preferences. It worked well for me on the Space One to get them closer to a sound I liked, with a bit of the edge taken off the higher frequencies. There’s also a sensor that detects when you remove the headphones and stops playback so you don’t miss any of your music or podcast. They once again come with a cloth bag that matches the color of the headphones instead of a case, which is one change I wish Soundcore had made, as the cloth bag doesn’t offer as much protection if you tend to throw your headphones into your backpack or bag.
The Soundcore Space One were among the best budget ANC headphones when they came out, and still hold up to more recent releases. But with the bump in price to over $100 for the Space 2, there’s a bit more expectation on them. ANC performance continues to improve — and products get cheaper — across manufacturers, so the Soundcore Space 2 has some competition from companies like Sony, EarFun, and JLab. If the ANC on the Space 2 stands up to current budget headphones and they still sound as good and are as comfortable as the Space One, you can expect to see the new Soundcore Space 2 on many recommendation lists.
Technology
Tired of websites blocking your VPN? A dedicated IP fixes that
NEWYou can now listen to Fox News articles!
If you have ever turned on your VPN and suddenly could not log in to your bank, email, streaming service or work portal, you are not imagining things. In fact, this is one of the most common frustrations VPN users face today.
However, the issue is not that VPNs stopped working. Instead, websites have become far more aggressive about blocking traffic that looks suspicious.
As a result, the way your VPN is built now matters just as much as whether you use one at all.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Shared VPN IPs often trigger red flags, which is why banks, email providers and streaming sites sometimes block access. (Kurt “CyberGuy” Knutsson)
Why websites block many VPN connections
Most VPNs give you a shared IP address. As a result, hundreds or even thousands of people can appear online from the same address at the same time. From a website’s perspective, that traffic pattern raises red flags. When platforms detect too many logins, rapid location changes or unusual activity tied to one IP, they step in quickly. In many cases, they respond by:
- Blocking access
- Triggering captchas
- Requiring extra verification codes
- Temporarily locking accounts
Meanwhile, you did nothing wrong. Instead, you end up dealing with restrictions caused by other users sharing that same IP address.
What a dedicated IP does differently
With a dedicated IP, you get an address that belongs only to you. Unlike shared VPN connections, no one else uses it.
Each time you connect, you use the same IP address. As a result, you avoid sharing traffic, rotating locations or competing with random users whose activity could trigger blocks.
Because of that consistency, your connection looks much more like a typical home or office internet setup. And that simple difference can dramatically reduce website suspicion and login headaches.
NEW YORK HALTS ROBOTAXI EXPANSION PLAN
A dedicated IP gives you a consistent address that looks more like a normal home connection, reducing captchas and login alerts. (Kurt “CyberGuy” Knutsson)
What a dedicated IP can do that shared VPN IPs usually can’t
That consistency does more than reduce suspicion; it improves how smoothly you access the sites and services you use every day.
Access more websites without blocks
Banks, government portals, healthcare sites, and streaming services are far less likely to block a dedicated IP because it does not show heavy or erratic traffic patterns.
Reduce captchas and security challenges
Those endless “prove you’re human” messages are usually triggered by shared IP abuse. A dedicated IP dramatically reduces them.
Make banking and email logins smoother
Financial institutions and email providers often flag constantly changing IP addresses as suspicious. A dedicated IP stays consistent, so login alerts and lockouts happen far less often.
Support remote work and secure systems
Some employers only allow access from approved IP addresses. Shared VPN IPs cannot be approved. Dedicated IPs can.
Improve streaming reliability
Shared VPN IPs are often the first to get blocked when streaming services crack down. Dedicated IPs are less likely to be flagged because traffic looks normal and predictable.
What a dedicated IP does not do
A dedicated IP:
- Does not remove encryption
- Does not expose your identity
- Does not weaken your privacy
Your traffic remains encrypted, and your real location stays hidden. You simply get a connection that websites trust more.
Who benefits most from a dedicated IP
A dedicated IP is especially helpful if you:
- Use online banking regularly
- Travel and access sites from different locations
- Work remotely
- Stream often
- Get tired of captchas and blocked pages
- Want a VPN that feels normal to use
GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK
With fewer blocks and smoother logins, a dedicated IP helps your VPN work quietly in the background instead of getting in your way. (Kurt “CyberGuy” Knutsson)
How to choose a VPN that offers a dedicated IP
If you want these benefits, look for a VPN provider that offers a dedicated IP option built directly into its service. Some providers include it in premium plans, while others offer it as an add-on. Either way, the process should be simple. You should be able to select your dedicated IP inside the app without advanced setup or manual configuration. Before signing up, check that the provider also offers strong speeds, reliable uptime and clear privacy policies. A dedicated IP improves access, but overall performance still matters.
What to look for beyond a dedicated IP
A dedicated IP reduces blocks. However, a quality VPN should also deliver strong security and smooth performance.
Fast, stable connections: Speed matters for streaming, video calls and everyday browsing. Look for providers known for consistent performance.
Wide server coverage: More server locations give you flexibility when traveling and help reduce location errors.
Clear privacy practices: Choose a VPN with a strict no-logs policy and independent audits when possible.
Secure server technology: Modern VPNs often use RAM-based servers that automatically wipe data on reboot.
Easy-to-use apps: Protection should feel simple, not technical. Clean apps across major devices make daily use effortless.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com
Kurt’s key takeaway
If your VPN keeps getting blocked, the problem may not be the VPN itself. It may be the shared IP address behind it. Websites are increasingly aggressive about suspicious traffic. When hundreds of users share the same IP, banks, email providers and streaming platforms take notice. That is when the captchas, verification codes and account lockouts start. A dedicated IP changes that experience. You still get encryption. You still protect your real location. But your connection looks stable and predictable, which helps you avoid constant interruptions.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Should protecting your privacy really mean fighting with your bank, email, and streaming apps? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Polymarket defends its decision to allow betting on war as ‘invaluable’
Polymarket has been allowing people to bet on when the US would strike Iran next. Obviously, now that it’s actually happened and people have died, the prediction betting market is feeling some pressure. The site has been at the center of controversy before, including suspicions of insider trading on the Super Bowl halftime show and the capture of Venezuelan President Nicolás Maduro.
In a statement posted on its site, Polymarket defended its decision to allow betting on the potential start of a war, saying that it was an “invaluable” source of news and answers, before taking shots at traditional media and Elon Musk’s X. The statement reads:
…
Read the full story at The Verge.
-
World4 days agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts4 days agoMother and daughter injured in Taunton house explosion
-
Montana1 week ago2026 MHSA Montana Wrestling State Championship Brackets And Results – FloWrestling
-
Denver, CO4 days ago10 acres charred, 5 injured in Thornton grass fire, evacuation orders lifted
-
Louisiana7 days agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Technology1 week agoYouTube TV billing scam emails are hitting inboxes
-
Technology1 week agoStellantis is in a crisis of its own making
-
Politics1 week agoOpenAI didn’t contact police despite employees flagging mass shooter’s concerning chatbot interactions: REPORT