SecurityWelcome to Episode 87. Last week, we took an in-depth look at data breaches: from how they happen to a few of the biggest ones, and of course, what you can do to protect yourself when a big company loses your data, we covered a…
May 7, 2018 •
14 min read
SecurityHow do you unlock your iPhone when you need to use it? Apple gives us a ton of options when it comes to keeping our information safe from prying eyes and unwanted intruders, from PINs to our fingerprints and our faces. Apple’s commitment to empowering…
May 10, 2018 •
12 min read
AppleOnly a few weeks after the recent release of macOS High Sierra 10.13.4, Apple has amended the update by publishing an additional fix under this version number. Addressing a new flaw described as “serious” by the security community, the supplemental version of 10.13.4 addresses a…
May 16, 2018 •
2 min read
SecurityThere are some items of technology in our lives that are so standard and ubiquitous because of how fundamental they are to the way things work that it’s very easy to take them for granted. Because we don’t pay a second thought to these things,…
May 17, 2018 •
15 min read
SecurityThe General Data Protection Regulation, or GDPR, is a new set of European Union rules that govern the ways businesses and online organizations treat user information, in particular the data belonging to EU citizens. The GDPR introduces a wide range of regulations, chief among them new restrictions on how third parties can process, store, and handle user information.
May 18, 2018 •
3 min read
SecurityEmail encryption is supposed to make the content of your emails safer, but according to a team of nine academic researchers, two of the most widely used encryption standards might be doing the opposite. In a tweet sent on May 14, 2018, Sebastian Schinzel, a…
May 21, 2018 •
3 min read
SecuritySecurity researchers use many tools to conduct their work; in many cases, the best way to test a system is to try to break in, because it allows one to identify all the weaknesses and potential inroads a real hacker might exploit. These tools aren’t…
May 23, 2018 •
3 min read
SecurityImagine if whenever you went to buy something — a car, perhaps — the information you handed over in the purchasing process became public record for anyone to see and search. All they’d have to do is plug your license plate in, and they’d be able to see your name, address, and phone number.
May 24, 2018 •
17 min read
SecurityThe 2018 parade of big tech and security headlines continues, and in recent episodes, we’ve touched on some pretty big developments. From Cambridge Analytica and Facebook scandals to the rollout of the General Data Protection Regulation in Europe, we’ve covered some major issues so far…
May 31, 2018 •
14 min read