Checklist 12:Five Tips for Secure Holiday Shopping

Checklist 12:Five Tips for Secure Holiday Shopping

It’s estimated that 120 million people shopped online on Cyber Monday in 2015, and that number is sure to be even higher this year! That’s a lot of gift shopping — and a lot of opportunities for something to go wrong. While shopping online is convenient, it also carries some security risks. On today’s Checklist: Five things you can do to make your online shopping more secure.

November 23, 2016 • 8 min read
Researcher Discovers That Shazam App Is Always On

Researcher Discovers That Shazam App Is Always On

Since its arrival in 2002, Shazam has become a popular tool among music fans for identifying songs playing on the radio, in restaurants, in movies or TV shows, and in other similar situations. However, according to recent research conducted by a former NSA staffer, the…

November 21, 2016 • 3 min read
Checklist 11: Traveling Safely with Your Mac and iOS Devices

Checklist 11: Traveling Safely with Your Mac and iOS Devices

Today’s topic: travel. Millions of people travel substantial distances every day, whether it’s for business or pleasure. For the safety of your devices and the security of your data, there are a few things you’ll want to do. Today we’ll look at several ways you can prepare and keep yourself safe on your trip.

November 17, 2016 • 8 min read
Checklist 09: Demystifying Malware Types and Terminology (Part 1)

Checklist 09: Demystifying Malware Types and Terminology (Part 1)

On today’s show we’re going to cover what makes a piece of spyware different from a worm, and what makes a keylogger different from adware. Once you can tell the difference between the different types of malware, you’ll be better prepared to understand just how the different types of threats can affect *you*, and which ones are worth losing sleep over!

November 3, 2016 • 9 min read
Search Engine Marketing Specialist

Search Engine Marketing Specialist

Since its inception in 1999 SecureMac has evolved into the foremost resource devoted to Macintosh security. Originally founded on the basis of raising awareness about Mac security, and to act as a Apple-oriented news portal, we soon grew into a reliable consulting resource. Our rapid…

November 4, 2016 • 3 min read
Securing Your iPad in iOS 10

Securing Your iPad in iOS 10

Ten years ago, the idea of powerful, portable tablets in everyday use around the world seemed closer to science fiction than reality. With the incredible success of the iPad and the ignition of a booming market for tablets, though, they’re now as ubiquitous as cell…

November 9, 2016 • 3 min read
Apple and Others Revoke All Security Certificates from Chinese Provider

Apple and Others Revoke All Security Certificates from Chinese Provider

In recent days, several major tech companies have formally disavowed and discontinued use of a Chinese security certificate provider, WoSign. The abandonments began when Mozilla announced that WoSign was not following best practices in issuing its certificates. The primary concern lies in the fact that…

November 9, 2016 • 2 min read
Checklist 10: Demystifying Malware Types and Terminology (Part 2)

Checklist 10: Demystifying Malware Types and Terminology (Part 2)

With malware attacks on the rise, more and more news coverage is devoted to analyzing these threats. On today’s show we’re going to help you make sense of all that security gibberish by demystifying the terminology and acronyms frequently encountered when it comes to malware.

November 10, 2016 • 10 min read
The New MacBook Pro Touch Bar Has Big Implications for Apple Pay

The New MacBook Pro Touch Bar Has Big Implications for Apple Pay

In keeping with its long tradition of placing groundbreaking new hardware and software on its devices, Apple’s latest product event made a big splash. With the first new MacBook Pro models in years, there was plenty for everyone in the industry to discuss. From dropping…

November 10, 2016 • 2 min read
Adobe Issues Zero-Day Exploit Patch for New Flash Vulnerability

Adobe Issues Zero-Day Exploit Patch for New Flash Vulnerability

Once an undeniable staple and even a trendsetting application across the web, Adobe Flash no longer enjoys the widespread popularity it once did. This shift of power is due in part to the rise of HTML5 video support across the Internet. Being more stable and…

November 11, 2016 • 3 min read
Checklist 11: Traveling Safely with Your Mac and iOS Devices

Checklist 11: Traveling Safely with Your Mac and iOS Devices

Today’s topic: travel. Millions of people travel substantial distances every day, whether it’s for business or pleasure. For the safety of your devices and the security of your data, there are a few things you’ll want to do. Today we’ll look at several ways you can prepare and keep yourself safe on your trip.

November 17, 2016 • 8 min read
Researcher Discovers That Shazam App Is Always On

Researcher Discovers That Shazam App Is Always On

Since its arrival in 2002, Shazam has become a popular tool among music fans for identifying songs playing on the radio, in restaurants, in movies or TV shows, and in other similar situations. However, according to recent research conducted by a former NSA staffer, the…

November 21, 2016 • 3 min read
Checklist 12:Five Tips for Secure Holiday Shopping

Checklist 12:Five Tips for Secure Holiday Shopping

It’s estimated that 120 million people shopped online on Cyber Monday in 2015, and that number is sure to be even higher this year! That’s a lot of gift shopping — and a lot of opportunities for something to go wrong. While shopping online is convenient, it also carries some security risks. On today’s Checklist: Five things you can do to make your online shopping more secure.

November 23, 2016 • 8 min read