SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Nicholas Raba, Nicholas Ptacek, and Ken Ray hit security topics for your Mac and iOS devices. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Episode: Checklist 212: The Hacky Holidays Special

Checklist 212: The Hacky Holidays Special

Voices of Checklists passed tell us about their favorite hacker movies, including Hackers, WarGames, Sneakers, and Superman III. What did they get right? What did they get wrong? And what can we learn from them? Snuggle up for The Hacky Holidays Special.

Read Listen

Checklist 209: Apple Flouts the Firewall

You trust Apple. You trust the firewall you’ve set up on your Mac. But – do you trust Apple to decide what your firewall should stop and what it shouldn’t? Patrick Wardle joins us to discuss the issue on Checklist 209 – brought to you by SecureMac.

Read Listen

Checklist 208: Safe Shopping Online in 2020

The holiday season is here again…but this year, of course, is a little bit different. With more of us shopping from home than ever before, we’ll show you the safest ways to buy gifts online. On this Checklist, we cover:

5 best practices for 2020 shoppingShopping extensions and your security

Safe shopping: a Checklist checklist

Checklist listeners may be familiar with some of the following tips, but it’s always a good idea to …

Read Listen

Checklist 207: Privacy and Security in macOS Big Sur

macOS Big Sur has arrived. Or, we’ve gotten to Big Sur. Whatever the case, there’s a host of new privacy and security features in the Mac’s latest operating system. We’re talking over some of them with SecureMac’s Nick Leon on Checklist 207.

Read Listen

Checklist 204: Cybercrime and the 2020 Election

The 2020 U.S. elections are just days away, and cybercriminals — some motivated by politics, others by financial gain — are stepping up their attacks. We’ll let you know what’s happening on this edition of the Checklist.

Voter intimidation emails attributed to Iran

We’ve talked before about the issue of foreign adversaries attempting to interfere with the upcoming U.S. elections, but this week a disturbing new development came to light. 

According to the …

Read Listen

Checklist 203: T2, Revisited Plus an Actual Checklist

On this week’s Checklist, we’ll cover:

How Macs are perceived in the enterpriseAn addendum to last week’s T2 storyA checklist of security tips from the NCSA

Survey says…

Do you feel like your Mac is the best choice for security? You’re not alone.

A recent survey conducted by enterprise software management platform Jamf asked businesses—both ones that used Macs and ones that didn’t—what they thought about the Mac in terms of security.

Across the board, …

Read Listen

Checklist 202: The T2 Vulnerability with Patrick Wardle

This week’s big news: an “unpatchable” hardware vulnerability affecting Apple’s T2 security chip! But how serious is it, really? We spoke with Mac security expert Patrick Wardle to separate the facts from the clickbait headlines. We’ll cover:

the technical backgroundwho’s impacted (and what they can do)

Parsing the T2 story

The Apple security community was abuzz this week with news of an unpatchable vulnerability in the T2 security chip found in newer Macs.

To …

Read Listen

Checklist 197: Staring at the Cloud with Dominique West

On this Checklist, we talk with cloud security expert Dominique West. The conversation covers career paths in infosec, today’s changing threat landscape, common misconceptions about cloud security, and the importance of community to the industry.

Read Listen

Checklist WWDC20 Outtake

We’re bringing you a WWDC outtake: an off-the-cuff, practically off-mic discussion of WWDCs past — as well as the roles Apple execs play.

Read Listen
1 2 3 4 5 13

Join our mailing list for the latest security news and deals