SecurityOn this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out of a Hollywood thriller. Here’s the…
November 8, 2019 •
8 min read
SecurityHigh-profile ransomware attacks on city and state governments have made national and international news in the past year. Many people are left wondering how serious the problem is—and what, if anything, can be done about it.
November 7, 2019 •
4 min read
SecurityFree and fair elections are the cornerstone of any democracy. But in recent years, the integrity of the electoral process itself has been called into question. People across the ideological spectrum are concerned about the political, technological, and social issues around voting: Foreign interference in…
November 5, 2019 •
6 min read
SecurityWe’ve talked about how cybersecurity affects enterprises and schools. But there’s another sector that is increasingly being targeted by cyberattacks: healthcare. The stakes are more than just financial—a cyberattack on a hospital or healthcare facility could literally become a matter of life and death. In…
November 4, 2019 •
7 min read
AppleIn recent weeks, several high-profile US organizations have faced controversy due to their ties with China—and due to the actions which they took in order to preserve those ties.
November 3, 2019 •
5 min read
SecurityThis week on the Checklist, we’ll catch you up on what Apple has been doing to keep you safe. We’ll talk about some adware apps that got the boot from the App Store. And finally, we’ll look at the cybersecurity implications of Catholicism 2.0. This…
November 1, 2019 •
10 min read
SecurityOn this edition of The Checklist: What to do if you lose the 2FA “thing you have, Privacy concerns behind the wheel, and Who’s who and why you should fear them.
October 24, 2019 •
9 min read
InterviewsNancy Willard is an educator and lawyer who runs Embrace Civility in the Digital Age, an organization dedicated to creating a culture of civility and positivity online through empowering teens and the adults who care for them. She is the author of several books, including…
October 23, 2019 •
8 min read
SecurityThis week on the Checklist, we’ll look at a troubling connection between Apple and the Chinese government. We’ll revisit the issue of IoT security (spoiler: It’s not getting any safer out there). And we’ll round out the list with a reminder that when it comes…
October 18, 2019 •
8 min read
SecurityBig companies spend millions of dollars guarding against data breaches—and sometimes they still come up short. So how can small businesses prevent data breaches? Can it even be done? Fortunately, the answer is yes—and there are a number of simple, cost-effective things smaller organizations can…
October 16, 2019 •
6 min read
InterviewsTroy Hunt is a Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. He is the creator of Have I Been Pwned (HIBP), a free service that aggregates data breaches and lets people check if their accounts have been compromised. He is also…
October 16, 2019 •
15 min read
SecurityEveryone loves a Mac. They’re famously easy to use. Many people find themselves more productive on Macs. And let’s face it—they definitely have a “cool” factor that PCs can’t match.
October 15, 2019 •
6 min read