logo
MakeDongle 2 - USB Dongle Protection For MacOS, Windows And Linux

MakeDongle 2 - USB Dongle Protection For MacOS, Windows And Linux

Scoopa day ago

Excel Software announced MakeDongle 2.0 for macOS or Windows. MakeDongle generates a secure USB dongle from a flash drive. The dongle grants a license to run protected software on all modern versions of Mac, Windows or Linux OS. MakeDongle complements a diverse suite of protection and licensing tools from Excel Software.
Protected software can be stored on the computer or dongle itself. On application launch, the dongle is validated before the software is allowed to run. Each dongle can be generated in seconds. When building dongles, MakeDongle can copy multiple licenses, applications or installers to the USB flash drive.
MakeDongle can be used standalone or with the QuickLicense, AppProtect or DocProtect products. It also works with licensing plugins for FileMaker and Xojo. To use MakeDongle alone, several coding interfaces are supported with sample code provided for popular programming languages.
MakeDongle works with QuickLicense. QuickLicense supports many license types including Trial, Product, Try/Buy and Subscription. Software is protected by adding API programming commands or by using the AddLicense wrapping tool without programming.
AddLicense is a popular choice for runtime environments like MAX, Adobe Air or Unity since application code and resources can be securely embedded within the EXE or APP file. Protected software can immediately launch when the appropriate dongle is present or optionally require a manual or online activation process. MakeDongle and QuickLicense give developers many options for software and hardware protection.
Excel spreadsheets can be protected using QuickLicense and OfficeProtect to produce an EXE for Windows or APP for Mac. This protection can be combined with a USB dongle to allow the App to run. The application and encrypted data files can be stored on the dongle making them easily portable between computers.
MakeDongle works with QuickLicenseRT Linux. QuickLicense and MakeDongle run on a Mac or Windows computer to produce a dongle and license files. The protected software run on a Linux computer with the dongle installed in any free USB port.
MakeDongle works with DocProtect on Mac, Windows or Linux. DocProtect wraps PDF, Video, Image slide shows or HTML files into a Mac or Windows application. The protected document can be used on any computer when the dongle is present. MakeDongle, DocProtect and QuickLicense can be combined to support other license types and features.
MakeDongle can be used with AppProtect to wrap Mac or Windows software into a protected application that only runs if the dongle is present. Dongle secured installers can be created using MakeDongle plus ClickInstall on Mac or Windows. The installer only runs if the dongle is present and can be distributed on the dongle itself.
MakeDongle 2.0 is $495 for a Single User License on Mac or Windows. Produce unlimited dongles for any number of products. The product includes royalty-free distribution rights for protected software. MakeDongle Mac is a Universal (Intel & Apple Silicon) App that runs on macOS 10.14 or later. MakeDongle Windows runs on Windows 10 or 11. Visit the company web site for demonstration videos and product information.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

MakeDongle 2 - USB Dongle Protection For MacOS, Windows And Linux
MakeDongle 2 - USB Dongle Protection For MacOS, Windows And Linux

Scoop

timea day ago

  • Scoop

MakeDongle 2 - USB Dongle Protection For MacOS, Windows And Linux

Excel Software announced MakeDongle 2.0 for macOS or Windows. MakeDongle generates a secure USB dongle from a flash drive. The dongle grants a license to run protected software on all modern versions of Mac, Windows or Linux OS. MakeDongle complements a diverse suite of protection and licensing tools from Excel Software. Protected software can be stored on the computer or dongle itself. On application launch, the dongle is validated before the software is allowed to run. Each dongle can be generated in seconds. When building dongles, MakeDongle can copy multiple licenses, applications or installers to the USB flash drive. MakeDongle can be used standalone or with the QuickLicense, AppProtect or DocProtect products. It also works with licensing plugins for FileMaker and Xojo. To use MakeDongle alone, several coding interfaces are supported with sample code provided for popular programming languages. MakeDongle works with QuickLicense. QuickLicense supports many license types including Trial, Product, Try/Buy and Subscription. Software is protected by adding API programming commands or by using the AddLicense wrapping tool without programming. AddLicense is a popular choice for runtime environments like MAX, Adobe Air or Unity since application code and resources can be securely embedded within the EXE or APP file. Protected software can immediately launch when the appropriate dongle is present or optionally require a manual or online activation process. MakeDongle and QuickLicense give developers many options for software and hardware protection. Excel spreadsheets can be protected using QuickLicense and OfficeProtect to produce an EXE for Windows or APP for Mac. This protection can be combined with a USB dongle to allow the App to run. The application and encrypted data files can be stored on the dongle making them easily portable between computers. MakeDongle works with QuickLicenseRT Linux. QuickLicense and MakeDongle run on a Mac or Windows computer to produce a dongle and license files. The protected software run on a Linux computer with the dongle installed in any free USB port. MakeDongle works with DocProtect on Mac, Windows or Linux. DocProtect wraps PDF, Video, Image slide shows or HTML files into a Mac or Windows application. The protected document can be used on any computer when the dongle is present. MakeDongle, DocProtect and QuickLicense can be combined to support other license types and features. MakeDongle can be used with AppProtect to wrap Mac or Windows software into a protected application that only runs if the dongle is present. Dongle secured installers can be created using MakeDongle plus ClickInstall on Mac or Windows. The installer only runs if the dongle is present and can be distributed on the dongle itself. MakeDongle 2.0 is $495 for a Single User License on Mac or Windows. Produce unlimited dongles for any number of products. The product includes royalty-free distribution rights for protected software. MakeDongle Mac is a Universal (Intel & Apple Silicon) App that runs on macOS 10.14 or later. MakeDongle Windows runs on Windows 10 or 11. Visit the company web site for demonstration videos and product information.

ReliaQuest report exposes rise of social engineering cyber threats
ReliaQuest report exposes rise of social engineering cyber threats

Techday NZ

time2 days ago

  • Techday NZ

ReliaQuest report exposes rise of social engineering cyber threats

ReliaQuest has released its latest quarterly report, outlining identified trends in cyber attacker techniques, malware use, and ransomware group activity observed between March and May 2025 across its customer base. ClickFix and social engineering tactics One of the most notable trends identified in the report is the widespread use of ClickFix, a social engineering method that misleads users into pasting malicious commands into tools such as PowerShell or the Windows Run prompt. Attackers disguise these actions as solutions to false issues, such as fake CAPTCHAs or Windows updates, enabling them to circumvent defences and introduce malware with comparative ease. This approach has facilitated the increased use of malware families such as Lumma and SectopRAT, both of which utilise trusted tools like MSHTA to deliver malicious payloads. The report notes that social engineering has significantly contributed to the rise of these attack vectors, stating, "Social engineering played a pivotal role in the success of these top tactics." Lateral movement and initial access trends Phishing-based techniques accounted for over half of observed initial access incidents among customers, while drive-by compromise incidents rose by 10% compared to the previous period. The report sees a shift, as attackers increasingly rely on user manipulation rather than exploiting technical vulnerabilities. ReliaQuest's analysis highlights the prominence of remote desktop protocol (RDP) over internal spear phishing as a method of lateral movement within networks. This shift is closely associated with attackers impersonating IT helpdesks to persuade users to install RDP tools. The report finds, "The shift away from tactics like internal spearphishing suggests attackers are favouring techniques that require less user interaction and offer more direct access to internal systems." Additionally, drive-by downloads powered by campaigns such as ClickFix and widely available phishing kits continue to lower the threshold for cybercriminal activity. External remote resources dropped from third to fourth place among initial access vectors, further illustrating the focus on exploiting human factors. MSHTA on the rise for defence evasion MSHTA (Microsoft HTML Application Host), a native Windows binary, was reported to be involved in 33% of defence evasion incidents during the period, up from just 3.1% the previous year. Attackers use this legitimate tool to bypass conventional security tools by convincing users to execute malicious commands themselves, often delivered through social engineering campaigns such as ClearFake. "ClearFake's early adoption of ClickFix techniques propelled MSHTA from 16th to second place among defence evasion tactics. Recently, other ClickFix adopters have fuelled MSHTA's current surge, leveraging broader social engineering tactics to bypass defences more effectively," the report details. Changes in ransomware operations The report notes significant changes among ransomware groups, with the closure of "RansomHub" leading many affiliates to migrate to other groups, notably Qilin, which saw a 148% increase in activity. Play and Safepay also reported increased activity of 116% and 266%, respectively. The number of active ransomware groups has dropped by nearly 30%, but newer or established ransomware-as-a-service (RaaS) platforms have absorbed most of these affiliates, raising concerns over increasingly professionalised threats. "With major ransomware groups like RansomHub gone, RaaS operators are vying to capitalise on the influx of affiliates searching for new platforms. To attract this talent, we'll likely see RaaS platforms introduce innovative capabilities or revise profit-sharing models. This competition is expected to create a more fragmented yet increasingly sophisticated ransomware ecosystem, posing even greater challenges for defenders." Impact on industry sectors The construction industry was the only sector to see an increase in ransomware attack victims, rising by 15%. ReliaQuest attributes this to opportunistic targeting as attackers seek out industries with perceived weaker defences. The report notes, "Construction organisations may feel compelled to pay ransoms quickly to avoid costly downtime and operational delays, making them attractive targets." By contrast, the retail sector saw a 62% decrease in victims, attributed to a drop in activity from the "CL0P" ransomware Cleo campaign. Malware trends and threat actor activity The period saw increased activity by the SectopRAT malware, delivered via ClickFix and malvertising campaigns. Despite infrastructure takedowns in May 2025, Lumma infostealer operations continue, with new logs advertised on cybercriminal forums and marketplaces. "Although Lumma's activity is likely to decline over the coming months as the impact of the takedown continues to unfold, it's likely the group could regain traction over time. As attention around the takedown diminishes, attackers may return to this familiar and well-established tool," the report comments. Emergence of Scattered Spider Scattered Spider, after a five-month hiatus, returned in April 2025 with attacks on UK retail organisations. The group is identified for using detailed social engineering against high-value individuals such as CFOs and utilising both on-premises methods and cloud techniques for stealth and control. "Scattered Spider's success lies in its ability to combine social engineering precision, persistence in cloud environments, and on-premises technical expertise. These TTPs allow the group to achieve initial access, maintain control, and operate stealthily, making it difficult for organizations to detect and remediate the group's activity in the early stages of an attack." Recommendations and defensive measures ReliaQuest's report makes several recommendations for organisations, including disabling Windows Run for non-administrative users, enforcing control over RDP tool installations, implementing web filtering, and prioritising user training against social engineering. Additional measures include strengthening identity verification, enabling advanced monitoring, and conducting regular risk assessments, particularly for privileged user accounts. Looking ahead, the report anticipates broader adoption of ClickFix among ransomware affiliates, increased sophistication by groups such as Scattered Spider, and the continued rise of infostealer malware like Acreed. The report concludes by emphasising the need for proactive investment in advanced detection, user education, and securing of both cloud and traditional infrastructure to counter an upward trend in attack complexity and evasion tactics.

Jamf report finds phishing & infostealers surge on Apple devices
Jamf report finds phishing & infostealers surge on Apple devices

Techday NZ

time3 days ago

  • Techday NZ

Jamf report finds phishing & infostealers surge on Apple devices

Jamf has released its Security 360 Report, highlighting significant security trends and risks for mobile and Mac devices within organisational environments worldwide. The report, which examines both mobile and macOS platforms, identifies phishing, infostealers, and operating system vulnerabilities as major concerns and areas where enterprises need to focus their cybersecurity efforts. According to Josh Stein, Vice President of Product Strategy at Jamf, the aim of the research is to help security professionals understand and manage the challenges posed by both longstanding and emerging threats. "Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked…nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community." Mobile threats The report notes that mobile devices are frequently the sole tools used by employees to access work resources, emphasising the need for robust defences across a variety of threat vectors. Jamf segmented its analysis of mobile device threats into four key areas: phishing, vulnerability management, application risk and malware, and spyware. Phishing attacks remain especially prevalent, with Jamf identifying approximately 10 million such attacks in the past year. The company reported that 25% of organisations experienced a social engineering incident and that one in ten users clicked on a malicious phishing link. The report suggests security training programmes and the adoption of layered, zero-trust security models can help mitigate these risks. In terms of vulnerability management, Jamf found that 32% of organisations had at least one device with critical vulnerabilities, and that 55.1% of mobile devices in use within workplaces were running on a vulnerable operating system. The company highlighted the importance of timely updates to patch known vulnerabilities, as provided by both Apple and Google. The research further discussed application risk, referencing Jamf's previous identification of a Transparency, Consent and Control (TCC) bypass flaw on iOS. The company demonstrated how side-loaded apps can compromise user privacy and emphasised the need for security controls that extend beyond just keeping operating systems up to date. Spyware and advanced malware were identified as threats that, though less frequent than on some platforms, are extremely sophisticated when they do emerge. High-profile individuals, including journalists, politicians, and diplomats, are at particular risk, with Apple sending compromise notifications to users in around 100 countries last year. The report recommends treating mobile devices with the same level of security as other endpoints in the enterprise environment. Threats to macOS Mac devices, which were once principally used by executives and creatives, have become common fixtures in enterprises across a range of sectors. According to the report, this proliferation has broadened the attack surface and increased the diversity of threats targeting the platform. Jamf outlined three principal areas of concern for macOS: application risk and malware, vulnerability management, and social engineering. Infostealers have become the dominant form of malware on Macs, accounting for 28.36% of all Mac malware analysed by Jamf, compared to just 0.25% in the previous year's findings. The report singles out employees in industries such as cryptocurrency as needing to be particularly alert, advocating for both ongoing training and adequate technological defences. The report also addresses myths about macOS security, noting that vulnerabilities persist despite perceptions of invulnerability. Jamf highlighted a recently discovered flaw in Gatekeeper, a mechanism intended to stop unverified apps from being run. The report notes the requirement for both effective technical controls and regular employee training to counter risks posed by software vulnerabilities. Social engineering threats, including phishing, exploit the widespread adoption of Macs in the workplace. Jamf cited campaigns that use professional social media platforms such as LinkedIn as initial attack vectors, rather than the email channels typically associated with phishing. The company recommends comprehensive employee training on all forms of phishing relevant to Mac users. Methodology The findings in the Security 360 Report are based on the analysis of 1.4 million devices protected by Jamf, conducted in the first quarter of 2025. The scope of analysis covered the previous year, included users in 90 countries, and spanned multiple mobile and desktop platforms, including iOS, iPadOS, Android, and macOS devices. The report draws on Jamf's proprietary Threat Intelligence, incorporating data from original research, device usage metrics, and analysis of news and external data feeds.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store