SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Checklist 61: App Stores, Malware, and How Security Firms Do Their Jobs

For years, people laboured under the misconceptions that Apple hardware and operating systems were immune to the threats and malware faced by the people who use Windows. While macOS may be stronger in some respects, what made the Mac the safest was the fact that relatively few people used it compared to Windows. But times have changed! For most of the past decade, growth for Apple machines has outpaced that of Windows machines. General consumers “saw the light” through the iPod and the iPhone and decided to give the …

Read Listen

Checklist 60: Safety in the App Store

Our lives are on our computers and our phones: there’s no getting around that fact. One day, we might look back on that and view it as a mistake, but for now, our finances, health records, communications, family photos, videos, and more all live on these devices. Keeping that information safe is important, and there are several layers of complexity to that challenge. From password practices to two-factor authentication and even to merely protecting your screen from prying eyes, we’ve covered a lot of these tactics on this show. …

Read Listen

Checklist 59: Bitcoin and the Blockchain: Understanding Cryptocurrency and Its...

Today, we’ll be tackling a couple of buzzwords in the tech industry today: blockchains and Bitcoins. Not unlike HTTPS and botnets, blockchain and Bitcoin are terms that are starting to seep into everyday use. Before we all start using them, though, we should figure out what they mean and how they work! In fact, the blockchain concept has even begun to garner its own “buzzword” status in the security community regarding how secure it can be for storing and accessing information. So, for all our listeners who aren’t even …

Read Listen
Episode: Checklist 54: The Equifax Hack

Checklist 54: The Equifax Hack

The personal information of 143-million people may have been compromised when the consumer credit reporting agency Equifax was hacked. What do we know about the attack? And what can we do going forward?

Read Listen
Episode: Checklist 50: Hacking Your Health

Checklist 50: Hacking Your Health

On today’s episode, we’re looking at the way technological change has affected modern medicine, threats the healthcare industry faces, and what we can do to protect patient safety now and in the future.

Read Listen
Episode: Checklist 49: Artificial Intelligence and Security

Checklist 49: Artificial Intelligence and Security

The rise of artificial intelligence in the consumer space seems to have happened overnight. It feels like we’ve gone from Apple’s introduction of Siri to virtual assistants everywhere in the blink of an eye. On today’s episode, we’ll be covering some security concerns that accompany the rise of AI.

Read Listen
Episode: Checklist 48: All About Spyware

Checklist 48: All About Spyware

On today’s episode we’ll be taking a look at spyware: what it does, where it comes from, and what you can do to defend against it.

Sometimes it’s pretty obvious when you’ve got a malware infection – ransomware lets you know that your files have been encrypted and are being held for ransom, while adware spawns endless popups in your web browser. Spyware operates a bit differently, and unlike other types of malware it prefers to remain hidden on an infected system. It might come as a surprise, but some spyware …

Read Listen
Episode: Checklist 46: A Brief History of Malware

Checklist 46: A Brief History of Malware

On today’s Checklist, we’re cracking open the history books! We’ll be looking at the evolution of malware: from the early days of “joke” viruses to the serious threat it poses today.

Read Listen
Episode: Checklist 42: The Internet of Things: New Devices, New Concerns

Checklist 42: The Internet of Things: New Devices, New Concerns

Today, Internet connectivity doesn’t just include computers and phones. It’s lights, cameras, thermostats, and more. It’s called the Internet of Things, and it’s the topic of today’s show! In this episode we’ll be taking a closer look at security concerns that come with all these new IoT devices.

Read Listen
1 15 16 17 18 19 20

Get the latest security news and deals