In this chapter, we’re going to pivot ever so slightly, changing gears from the previous chapter that was focused more on threats and attack types to that of the attackers themselves. To further understand computer security and by extension, protect your Mac from current and surprisingly novel ways that bad actors continue to develop to attack macOS-based devices, one should try to see things as they do.
Now I’m not suggesting you quit your day job and seek a position in Information Security (though, if you were inclined to make ...