Competing Hackers Discover Method for Hijacking the Touch Bar

Competing Hackers Discover Method for Hijacking the Touch Bar

When Apple revealed its long-awaited refresh of the MacBook line last year, the Touch Bar was touted as a major selling point. By incorporating the same sensor technology already present in the iPhone, Apple said that a wide variety of new applications were available. From…

March 30, 2017 • 2 min read
Checklist 30: What Happens When “The Cloud” Goes Bad

Checklist 30: What Happens When “The Cloud” Goes Bad

As helpful as the convenience of storing data in “the Cloud” can be, there are lots of examples of problems with cloud services causing disruption for individuals and for businesses. What happens when “the Cloud” goes bad? That’s our topic for this edition of The Checklist. We’ll look at problems you might encounter when using iCloud, as well as some of the broader issues with cloud computing in general.

March 30, 2017 • 10 min read
Checklist 29: Encrypted Chat Apps for Secure Messaging on iOS

Checklist 29: Encrypted Chat Apps for Secure Messaging on iOS

Encryption is big news today for security professionals and regular users as well. As more and more people are concerning themselves with keeping their communication secret, a large number of encrypted messaging apps are hitting the scene. How do you pick one? And what do you need to know about them?

March 23, 2017 • 11 min read
New macOS Ransomware Patcher aka FileCoder

New macOS Ransomware Patcher aka FileCoder

Since last year’s emergence of KeRanger, the first functional ransomware for macOS, it seemed only a matter of time before more threats of that type appeared. Security researchers recently found the newest attempt at ransomware for the Mac out in the wild. Masquerading as a…

March 1, 2017 • 3 min read
Checklist 26: Recent Upswing in Mac Malware Activity

Checklist 26: Recent Upswing in Mac Malware Activity

The last few months of 2016 were kind of quiet in terms of sightings of new Mac malware, but maybe that was just the calm before the storm. 2017 has already seen a plethora of newly discovered malware targeting the Mac. On today’s Checklist we’re covering five recent Mac malware threats and a bonus item: How to minimize those threats.

March 2, 2017 • 12 min read
Checklist 27: Steps to take when you suspect a malware infection

Checklist 27: Steps to take when you suspect a malware infection

When you suspect your Mac is infected, it’s important to take steps to find and fix the problem before the issue becomes severe — or worse, before your personal information is stolen. On today’s episode, we’ll look at the process you should follow if you think your Mac is suffering from a malware infection.

March 9, 2017 • 9 min read
Internet-Enabled Children’s Toys Expose Data for Hundreds of Thousands of Users

Internet-Enabled Children’s Toys Expose Data for Hundreds of Thousands of Users

Internet-Enabled Children’s Toys Expose Data for Hundreds of Thousands of Users Have you heard of the “Internet of Things”? A relatively newer term, this phrase refers to far more than just Internet-connected thermostats and Wi-Fi-enabled refrigerators. Companies now build network functionality even into children’s toys….

March 10, 2017 • 3 min read
Checklist 28: Five Malware Distribution Methods and How to Protect Against Them

Checklist 28: Five Malware Distribution Methods and How to Protect Against Them

When you know where malware is most likely to be found and how it’s most likely to attack, you can take steps to avoid it. From email attachments to hacked websites, malware lurks in a number of places. On today’s episode, we’ll look at how malware is distributed: the means, the methods, and the most effective ways to mitigate the risks.

March 16, 2017 • 11 min read
Google Discloses Major Vulnerability in ESET Mac Antivirus Software

Google Discloses Major Vulnerability in ESET Mac Antivirus Software

If there is one type of software a user should have the ability to trust, it’s legitimate antivirus programs. As a tool designed to protect from malware attacks, every antivirus effort requires careful, thoughtful design and an absolute focus on the safety and security of…

March 18, 2017 • 3 min read
SecureMac Releases PrivacyScan 1.9.2 to Enhance User Privacy

SecureMac Releases PrivacyScan 1.9.2 to Enhance User Privacy

Las Vegas, Nevada, 20 March 2017 — SecureMac has announced the release of PrivacyScan 1.9.2, the latest version of its award-winning software designed to protect user privacy. The incremental update provides a more refined user experience while also addressing minor bugs. PrivacyScan 1.9.2 adds support to…

March 20, 2017 • 2 min read
Apple Reassures Users: Flaws in WikiLeaks/CIA Vault7 Leak Already Patched

Apple Reassures Users: Flaws in WikiLeaks/CIA Vault7 Leak Already Patched

On March 7th, WikiLeaks entered the news and made waves again by releasing almost nine thousand documents they claimed came from within the US Central Intelligence Agency. Contained in the leak was a vast range of information about the CIA’s intelligence gathering practices regarding technology….

March 21, 2017 • 2 min read
Checklist 29: Encrypted Chat Apps for Secure Messaging on iOS

Checklist 29: Encrypted Chat Apps for Secure Messaging on iOS

Encryption is big news today for security professionals and regular users as well. As more and more people are concerning themselves with keeping their communication secret, a large number of encrypted messaging apps are hitting the scene. How do you pick one? And what do you need to know about them?

March 23, 2017 • 11 min read
Checklist 30: What Happens When “The Cloud” Goes Bad

Checklist 30: What Happens When “The Cloud” Goes Bad

As helpful as the convenience of storing data in “the Cloud” can be, there are lots of examples of problems with cloud services causing disruption for individuals and for businesses. What happens when “the Cloud” goes bad? That’s our topic for this edition of The Checklist. We’ll look at problems you might encounter when using iCloud, as well as some of the broader issues with cloud computing in general.

March 30, 2017 • 10 min read