SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Nicholas Raba, Nicholas Ptacek, and Ken Ray hit security topics for your Mac and iOS devices. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Episode: The Equifax Hack

The Equifax Hack

The personal information of 143-million people may have been compromised when the consumer credit reporting agency Equifax was hacked. What do we know about the attack? And what can we do going forward?

Read Listen
Episode: How Many Lightbulbs Does It Take to Change the Internet?

How Many Lightbulbs Does It Take to Change the Internet?

We know that an unsecured Internet of Things (IoT) thing like a light bulb or a web-connected picture frame can become part of a botnet or a dedicated denial of service attack. But how does that happen? That’s the topic of today’s show.

Read Listen
Episode: 5 Things to Understand About How Botnets Work

5 Things to Understand About How Botnets Work

With malicious networks using tens of millions of computers and devices to serve up spam, run denial of service attacks, and more, botnets are a threat we can’t ignore.

Read Listen
Episode: Five of the Most Notable Data Breaches in History

Five of the Most Notable Data Breaches in History

Today, we are looking at five of the biggest data breaches and most notable hacks in history. Who got hit? What data was stolen? How did they happen?

Read Listen
Episode: Hacking Your Health

Hacking Your Health

On today’s episode, we’re looking at the way technological change has affected modern medicine, threats the healthcare industry faces, and what we can do to protect patient safety now and in the future.

Read Listen
Episode: Artificial Intelligence and Security

Artificial Intelligence and Security

The rise of artificial intelligence in the consumer space seems to have happened overnight. It feels like we’ve gone from Apple’s introduction of Siri to virtual assistants everywhere in the blink of an eye. On today’s episode, we’ll be covering some security concerns that accompany the rise of AI.

Read Listen
Episode: All About Spyware

All About Spyware

On today’s episode we’ll be taking a look at spyware: what it does, where it comes from, and what you can do to defend against it.

Sometimes it’s pretty obvious when you’ve got a malware infection – ransomware lets you know that your files have been encrypted and are being held for ransom, while adware spawns endless popups in your web browser. Spyware operates a bit differently, and unlike other types …

Read Listen
Episode: 5 Things To Know About Identity Theft

5 Things To Know About Identity Theft

Today’s episode of The Checklist is all about identity theft. With the right information, the wrong people can steal your identity – basically pretend to be you – and do a lot of damage in your name, and to your name.

Read Listen
Episode: A Brief History of Malware

A Brief History of Malware

On today’s Checklist, we’re cracking open the history books! We’ll be looking at the evolution of malware: from the early days of “joke” viruses to the serious threat it poses today.

Read Listen
Episode: Social Engineering: The Human Element of Hacking

Social Engineering: The Human Element of Hacking

In the world of security, deception is as big a threat as any malware you might find. From spear phishing to scary sounding phone calls, these threats all fall into the same category: social engineering.

Read Listen
Episode: A look at encryption, past and present.

A look at encryption, past and present.

Today’s episode is all about encryption. We’ll look at encryption across time – from ancient history, to encountering it today on the web.

Read Listen
Episode: 5 Things to Know About Spam

5 Things to Know About Spam

Today’s episode is all about spam! No, not the mystery meat, but rather those mountains of junk email that clog up your inbox and take up your time.

Read Listen
1 2 3 5

Join our mailing list for the latest security news and deals