SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Nicholas Raba, Nicholas Ptacek, and Ken Ray hit security topics for your Mac and iOS devices. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

The Latest Security Features in iOS 11: Part One

Have we ever talked about the security features built into iOS itself? Of course — we’ve covered that subject in many previous episodes, but things change. When The Checklist began, users were still walking around with iOS 9. Now we’re up to iOS 11, and Apple continues to make things more secure as they go. Even before iOS 11, Apple’s mobile system had some serious security protections and features, but they’ve added some new ones and refined others, so it’s time to revisit the topic.

Read Listen
Episode: An Overview of the Mac’s Most Important Built-in Security Features

An Overview of the Mac’s Most Important Built-in Security...

For this week’s show, we’re back to talking about the Mac — more specifically, addressing some of the most important security features baked directly into macOS. What steps has Apple taken to keep users safe, and what tools are there to make sure we’re all enjoying our Macs safely and securely? Perhaps you know someone who is about to get a new Mac, or maybe you’re even the one giving …

Read Listen

Safely Shopping for Technology This Holiday Season

The holiday shopping season has arrived again — and with this episode, we’re turning our attention to some security issues specific to this time of year. With Christmas coming up, you might be looking at all kinds of electronic gadgets for your friends and family. From tech-based toys to Internet of Things products, retailers have more web-connected devices available for us every year.

While it’s certainly a fun time …

Read Listen

Your Guide to Securing Your Parents’ Computer

During last week’s episode, our discussion centered around talking to your parents about the importance of computer security, and how to educate them on essential steps to take. This week, we’re going to move beyond the parents and look at their computers ourselves —with their permission of course! After your pep talk about strong passwords, you should hope to find their computer protected with a password you can’t guess.

Read Listen

Talking to Your Parents About Computer Security

Remember back when you were a kid, and someone sat you down to have “The Talk”? It might have been your parents, or it could have been a teacher, but we’ve all been through the experience of learning about “the birds and the bees.” It’s a pivotal moment, and learning about the facts of life can be, well, life-changing. It’s also essential for keeping you safe as you continue to grow up. Well, now you’re grown — you’re older and definitely a little wiser. It might be time to sit down with your parents and have your own version of The Talk with them.

Read Listen

App Stores, Malware, and How Security Firms Do Their Jobs

For years, people laboured under the misconceptions that Apple hardware and operating systems were immune to the threats and malware faced by the people who use Windows. While macOS may be stronger in some respects, what made the Mac the safest was the fact that relatively few people used it compared to Windows. But times have changed! For most of the past decade, growth for Apple machines has outpaced …

Read Listen

Safety in the App Store

Our lives are on our computers and our phones: there’s no getting around that fact. One day, we might look back on that and view it as a mistake, but for now, our finances, health records, communications, family photos, videos, and more all live on these devices. Keeping that information safe is important, and there are several layers of complexity to that challenge. From password practices to two-factor authentication …

Read Listen

Bitcoin and the Blockchain: Understanding Cryptocurrency and Its...

Today, we’ll be tackling a couple of buzzwords in the tech industry today: blockchains and Bitcoins. Not unlike HTTPS and botnets, blockchain and Bitcoin are terms that are starting to seep into everyday use. Before we all start using them, though, we should figure out what they mean and how they work! In fact, the blockchain concept has even begun to garner its own “buzzword” status in the security …

Read Listen
Episode: The Equifax Hack

The Equifax Hack

The personal information of 143-million people may have been compromised when the consumer credit reporting agency Equifax was hacked. What do we know about the attack? And what can we do going forward?

Read Listen
Episode: How Many Lightbulbs Does It Take to Change the Internet?

How Many Lightbulbs Does It Take to Change the Internet?

We know that an unsecured Internet of Things (IoT) thing like a light bulb or a web-connected picture frame can become part of a botnet or a dedicated denial of service attack. But how does that happen? That’s the topic of today’s show.

Read Listen
Episode: Hacking Your Health

Hacking Your Health

On today’s episode, we’re looking at the way technological change has affected modern medicine, threats the healthcare industry faces, and what we can do to protect patient safety now and in the future.

Read Listen
Episode: Artificial Intelligence and Security

Artificial Intelligence and Security

The rise of artificial intelligence in the consumer space seems to have happened overnight. It feels like we’ve gone from Apple’s introduction of Siri to virtual assistants everywhere in the blink of an eye. On today’s episode, we’ll be covering some security concerns that accompany the rise of AI.

Read Listen
Episode: All About Spyware

All About Spyware

On today’s episode we’ll be taking a look at spyware: what it does, where it comes from, and what you can do to defend against it.

Sometimes it’s pretty obvious when you’ve got a malware infection – ransomware lets you know that your files have been encrypted and are being held for ransom, while adware spawns endless popups in your web browser. Spyware operates a bit differently, and unlike other types …

Read Listen
Episode: 5 Things To Know About Identity Theft

5 Things To Know About Identity Theft

Today’s episode of The Checklist is all about identity theft. With the right information, the wrong people can steal your identity – basically pretend to be you – and do a lot of damage in your name, and to your name.

Read Listen
1 2 3 4

Join our mailing list for the latest security news and deals