Cybersecurity News
Welcome to Cybersecurity News!
A community that collect news and other tidbits related to cybersecurity in all its domains.
There are no hard and fast rules regarding what to post here-- we are fine with both pop news articles and more technical pieces regarding cybersecurity.
We use a bot called flynnbot to repost some rss feed content but the majority of posts are human-curated.
New to Cybersecurity?
Here are some resources to get you started:
Related Communities
!security_cpe@infosec.pub
!cybersecurity@zerobytes.monster
!packetstorm@zerobytes.monster
!security@programming.dev
!secops@lemmy.world
!cybersecurity@sh.itjust.works
!netsec@zerobytes.monster
!securitynews@infosec.pub
!cloudsecurity@infosec.pub
!netsec@links.hackliberty.org
!cybersecurity@infosec.pub
!cybersecuritymemes@lemmy.world
view the rest of the comments
In theory yes. In reality it is highly unlikely to the point that you shouldn’t worry about it.
If someone happens to find an exploit that lets them execute code on the host machine or access to memory addresses that aren’t theirs. Then 100% they could infect everything.
Likelihood very low, would have to be the perfect storm of exploit plus permissions plus apples permissions to access stuff being broad enough that it can do what it wants.
If you are super paranoid, your Mac is taking snapshots of your disk in the background so you can always restore back every single time you do something questionable
Thank you for the detailed answer!