Planning your digital legacy

Planning your digital legacy

Estate planning is a sensitive subject. Yet making arrangements for what happens to your estate after you’re gone is important, as it ensures that your loved ones will receive what you intend to leave them without paying burdensome taxes or going through a lengthy legal…

July 24, 2019 • 4 min read
Five ways to keep your kids off dating apps

Five ways to keep your kids off dating apps

Being a mom or dad is hard. And these days, it seems like it’s harder than ever. In addition to all the old challenges of raising happy and healthy kids, we have a host of new things to worry about as well. And one of…

July 23, 2019 • 5 min read
Securing your IoT home

Securing your IoT home

The Internet of Things (IoT) continues to grow at a remarkable pace—with analysts predicting the global IoT market to be worth a staggering half a trillion dollars by 2021. But experts have also noticed another IoT trend: dangerously lax security. In this article, we’ll give…

July 18, 2019 • 5 min read
Sneaky Gatekeeper Flaw Could Let Hackers Run Malware on Macs

Sneaky Gatekeeper Flaw Could Let Hackers Run Malware on Macs

Among the most fundamental security features on Macs, Gatekeeper is near the top of the list. A first line of defense against malicious software, Gatekeeper’s job is to verify code signatures, which ensures that the software you’re running is genuine and hasn’t been tampered with…

July 3, 2019 • 3 min read
Checklist 144: Summer Security Blockbusters

Checklist 144: Summer Security Blockbusters

This week, we’re going to the movies! It’s our special summer security blockbusters edition of The Checklist, where we take a fun and whimsical look at some of the big technical concerns that pop up in our favorite movies and how they can relate to some real-life issues, too.

July 5, 2019 • 1 min read
New Mac Malware Knows When You’re Watching

New Mac Malware Knows When You’re Watching

Security researchers at Intego have discovered a new form of Mac malware—one that shows some surprisingly sneaky behaviour aimed at evading detection by antivirus software and human malware hunters alike.

July 8, 2019 • 4 min read
Checklist 145: Zooming on Through

Checklist 145: Zooming on Through

On this edition of The Checklist: A look at the Zoom for Mac vulnerability, OpenID raises questions over Sign in with Apple, and The UK issues some big GDPR fine.

July 11, 2019 • 11 min read
Checklist 146: Just Because You Can…

Checklist 146: Just Because You Can…

On this edition of The Checklist we talk about: Should YOU be running beta software? Should ANYONE block Apple’s silent updates? And should there REALLY be an app for your flatiron?

July 18, 2019 • 11 min read
Securing your IoT home

Securing your IoT home

The Internet of Things (IoT) continues to grow at a remarkable pace—with analysts predicting the global IoT market to be worth a staggering half a trillion dollars by 2021. But experts have also noticed another IoT trend: dangerously lax security. In this article, we’ll give…

July 18, 2019 • 5 min read
Five ways to keep your kids off dating apps

Five ways to keep your kids off dating apps

Being a mom or dad is hard. And these days, it seems like it’s harder than ever. In addition to all the old challenges of raising happy and healthy kids, we have a host of new things to worry about as well. And one of…

July 23, 2019 • 5 min read
Planning your digital legacy

Planning your digital legacy

Estate planning is a sensitive subject. Yet making arrangements for what happens to your estate after you’re gone is important, as it ensures that your loved ones will receive what you intend to leave them without paying burdensome taxes or going through a lengthy legal…

July 24, 2019 • 4 min read