Checklist 50: Hacking Your Health

Checklist 50: Hacking Your Health

On today’s episode, we’re looking at the way technological change has affected modern medicine, threats the healthcare industry faces, and what we can do to protect patient safety now and in the future.

August 17, 2017 • 18 min read
iOS 11: What to Expect from the Next Major Version Change

iOS 11: What to Expect from the Next Major Version Change

Among a slew of other announcements at Apple’s WWDC in June this year was the news that iPhone and iPad users would finally see the release of iOS 11 later this year. After the recent release of iOS 10.3.3 to users and the release of…

August 1, 2017 • 2 min read
Remember MySpace? Your Old Account Could Be Vulnerable

Remember MySpace? Your Old Account Could Be Vulnerable

Social media has come a long way from its early days, and with the domination of major players including Facebook and Twitter, many of the early pioneers have faded into relative obscurity. Friendster abandoned plain social networking in 2011 and finally shuttered its services in…

August 2, 2017 • 2 min read
The Age of iPhone Jailbreaking is Drawing to a Close

The Age of iPhone Jailbreaking is Drawing to a Close

Remember jailbreaking? From the first iPhone, it has been an integral part of the community around the device and even something which has pushed its development forward. Initially, just a way to unlock the phone and release it from the “jail” of an exclusive carrier…

August 3, 2017 • 3 min read
Checklist 48: All About Spyware

Checklist 48: All About Spyware

On today’s episode we’ll be taking a look at spyware: what it does, where it comes from, and what you can do to defend against it. Sometimes it’s pretty obvious when you’ve got a malware infection – ransomware lets you know that your files have…

August 3, 2017 • 27 min read
Security Researchers Develop New Exploits Based on Leaked NSA Tools

Security Researchers Develop New Exploits Based on Leaked NSA Tools

While the WannaCry ransomware wave was sweeping the globe, one of the first stories that emerged alongside it was about the exploit that allowed it to exist: EternalBlue. Exposed as an NSA-discovered vulnerability during leaks by the mysterious Shadow Brokers, it allows malware authors to…

August 5, 2017 • 2 min read
Google Makes Changes to Prevent Future Docs Phishing Attacks

Google Makes Changes to Prevent Future Docs Phishing Attacks

Earlier this year, Google users encountered a unique and particularly devious phishing attack. Phishers have used Google Docs in various capacities for several years, most frequently creating phony forms to try to collect sensitive user data. During this enormous wave of phishing attempts, though, users…

August 8, 2017 • 2 min read
Checklist 49: Artificial Intelligence and Security

Checklist 49: Artificial Intelligence and Security

The rise of artificial intelligence in the consumer space seems to have happened overnight. It feels like we’ve gone from Apple’s introduction of Siri to virtual assistants everywhere in the blink of an eye. On today’s episode, we’ll be covering some security concerns that accompany the rise of AI.

August 10, 2017 • 16 min read
Securing Your Data with macOS and Keychain

Securing Your Data with macOS and Keychain

Every time a new version of Apple’s operating system arrives, every tech-focused publication on the Internet does a deep dive on the new key features. Occasionally, though, cool bells and whistles go overlooked. Such is the case with the macOS Keychain Access application, which, in…

August 11, 2017 • 3 min read
Apple Removes VPNs from Chinese App Store

Apple Removes VPNs from Chinese App Store

One of Apple’s most famous marketing campaigns revolved around the catchphrase “There’s an app for that”—to the point that Apple eventually had the slogan trademarked. However, for users living in China, that statement is no longer true. According to a recent report from CNBC, Apple…

August 14, 2017 • 3 min read
Checklist 50: Hacking Your Health

Checklist 50: Hacking Your Health

On today’s episode, we’re looking at the way technological change has affected modern medicine, threats the healthcare industry faces, and what we can do to protect patient safety now and in the future.

August 17, 2017 • 18 min read