SecurityChecklist 160: What If You Lose One Factor?
On this edition of The Checklist: What to do if you lose the 2FA “thing you have, Privacy concerns behind the wheel, and Who’s who and why you should fear them.
October 24, 2019 • 9 min read
SecurityOn this edition of The Checklist: What to do if you lose the 2FA “thing you have, Privacy concerns behind the wheel, and Who’s who and why you should fear them.
October 24, 2019 • 9 min read
Nancy Willard is an educator and lawyer who runs Embrace Civility in the Digital Age, an organization dedicated to creating a culture of civility and positivity online through empowering teens and the adults who care for them. She is the author of several books, including…

This week on the Checklist, we’ll look at a troubling connection between Apple and the Chinese government. We’ll revisit the issue of IoT security (spoiler: It’s not getting any safer out there). And we’ll round out the list with a reminder that when it comes…

Big companies spend millions of dollars guarding against data breaches—and sometimes they still come up short. So how can small businesses prevent data breaches? Can it even be done? Fortunately, the answer is yes—and there are a number of simple, cost-effective things smaller organizations can…



Identity theft can upend your life. It requires a tremendous amount of time and effort to undo the damage—and the aftereffects can be felt for months or even years.
October 2, 2019 • 8 min read
On this edition of The Checklist: The DoorDash data breach, Considering risks around AltStore, And the security side of recent Apple updates.
October 4, 2019 • 11 min read
It’s official: macOS 10.15 Catalina has now been released to the public. The latest Mac OS has a number of new features, including several key enhancements to security and privacy. But Apple’s release notes can sometimes be a bit heavy on jargon, leading users to…
October 9, 2019 • 8 min read
Michael Hartl is an award-winning educator and passionate advocate for technical literacy. He is the author of numerous books on programming, including the Ruby on Rails Tutorial, an introduction to web development which has helped people all around the world learn to code. Michael is…
October 9, 2019 • 7 min read
We’ve talked quite a bit about jailbreaks in the past couple of months, from Apple’s accidental reintroduction of an old iOS jailbreak to one developer’s attempt to create an app marketplace for unapproved iOS software. But recently, news has surfaced of a new jailbreak for…
October 10, 2019 • 5 min read
On this Checklist, we’ll take a look at the latest version of macOS. We’ll revisit two-factor authentication by way of a somewhat disappointing story involving Twitter. And we’ll round out the show with news of yet another data breach.
October 10, 2019 • 8 min read
Everyone loves a Mac. They’re famously easy to use. Many people find themselves more productive on Macs. And let’s face it—they definitely have a “cool” factor that PCs can’t match.
October 15, 2019 • 6 min read
Troy Hunt is a Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. He is the creator of Have I Been Pwned (HIBP), a free service that aggregates data breaches and lets people check if their accounts have been compromised. He is also…
October 16, 2019 • 15 min read
Big companies spend millions of dollars guarding against data breaches—and sometimes they still come up short. So how can small businesses prevent data breaches? Can it even be done? Fortunately, the answer is yes—and there are a number of simple, cost-effective things smaller organizations can…
October 16, 2019 • 6 min read
This week on the Checklist, we’ll look at a troubling connection between Apple and the Chinese government. We’ll revisit the issue of IoT security (spoiler: It’s not getting any safer out there). And we’ll round out the list with a reminder that when it comes…
October 18, 2019 • 8 min read