Checklist 152: Sharing is Scaring

Checklist 152: Sharing is Scaring

On this edition of The Checklist: Convenience versus privacy on Yelp, Tips for staying digitally safe on campus, and Everybody needs to update their everything!

August 29, 2019 • 10 min read
Do schools have a cybersecurity problem?

Do schools have a cybersecurity problem?

We often think of financial institutions, corporations, and governments as the primary targets of cyberattacks. But are schools at risk as well?

The answer, unfortunately, is yes—and the problem is growing.

In this two-part article, we’ll provide you with an overview of the problem, as well as some actionable ideas for dealing with it.

The changing face of education

With state and local education budgets stretched thin, and faced with the challenges of preparing students for an increasingly tech-centric job market, school districts across the country have embraced technological solutions that promise to do …

August 28, 2019 • 4 min read
Apple AirDrop Vulnerability Broadcasts User Phone Numbers to Potential Attackers

Apple AirDrop Vulnerability Broadcasts User Phone Numbers to Potential Attackers

iPhone users who frequently use the AirDrop feature to share images, videos, or other files may unwittingly be broadcasting their phone numbers to people nearby. According to a recent Ars Technica report, a hacker would need to have a laptop and a “wireless packet sniffer” dongle to exploit the vulnerability. Armed with those components, a security researcher testing the proof-of-concept software designed to exploit the vulnerability was able to see “details of more than a dozen iPhones and Apple Watches that were within radio range” and use this information to …

August 24, 2019 • 3 min read
Checklist 151: Too Close for Security Comfort

Checklist 151: Too Close for Security Comfort

This week on the Checklist podcast, we’ll talk about how to deal with security risks that come from those closest to you (literally). We’ll take you through some bad iOS news from the past week, and also discuss how it relates to a larger issue related to mobile security. And finally, we revisit a familiar topic—passwords—and tell you about some newly released Google research that probably means we’ll have to keep talking about passwords for the foreseeable future. Here’s our weekly Checklist:

Protecting your data from the people – literally – …

August 22, 2019 • 12 min read
Careers In Cybersecurity

Careers In Cybersecurity

In the first part of this two-part series, we made the case for cybersecurity as a career path with excellent short and long-term growth prospects.

But what, exactly, do folks who work in cybersecurity do all day?

That’s what we’ll cover in this article. 

While the list of jobs won’t be exhaustive—cybersecurity, like any complex and growing field, has a wide array of opportunities—it will cover some of the most in-demand specializations and give a representative sampling of the kinds of jobs out there (along with a general idea of how much they …

August 19, 2019 • 4 min read
Checklist 150: Trust Issues

Checklist 150: Trust Issues

On this edition of The Checklist: The Siri Sessions, O.MG: A Cable Hack, and 15 Apps to Watch for on Kids’ Phones.

August 15, 2019 • 9 min read
Should you post pictures of your kids on social media?

Should you post pictures of your kids on social media?

Parents are proud of their kids, and it’s natural to want to share special moments from their lives with friends and family on social media. But a growing chorus of experts is warning that sharing too much of our children’s private lives can do real harm.

What you decide to put on social media is a personal decision…but it should be an informed decision. Here are five things to consider before posting those baby bathtime photos—along with some tips to protect your children’s privacy and help keep them safe.

article span.backnum { …

August 14, 2019 • 5 min read
Sign in with Apple: Digital privacy at last?

Sign in with Apple: Digital privacy at last?

At this year’s Worldwide Developers Conference, Apple announced several forthcoming changes aimed at improving privacy and security for its users. Perhaps the most important of these was “Sign in with Apple”, slated for widespread release later this year.

In this post, we’ll talk about what Sign in with Apple is, why it matters…and whether or not it’s all it’s cracked up to be.

What is Sign in with Apple?

Many apps ask users to sign-in with a social media account, ostensibly in order to offer a more personalized experience. You’ve probably seen or …

August 14, 2019 • 4 min read
Are Cybersecurity Skills In Demand?

Are Cybersecurity Skills In Demand?

As millions of students head back to university this fall, a substantial chunk of them will do so without knowing what they’re actually going to end up studying.

For most undeclared majors, the final decision is going to come down to career prospects: whether or not they’ll be able to find a job after graduation.

Of course, nobody knows exactly what the economy is going to be doing (or not doing) in four years, but the best hedge against uncertainty has always been to figure out what skills are in demand—and learn …

August 12, 2019 • 3 min read
Black Hat 2019: Apple’s $1 million prize, new vulnerabilities revealed, and a keynote to remember

Black Hat 2019: Apple’s $1 million prize, new vulnerabilities revealed, and a keynote to remember

The 22nd annual Black Hat USA conference was held this week in Las Vegas. Black Hat is one of the most important events in cybersecurity, bringing together researchers, developers, and hackers from all over the world for a week of training sessions and briefings. As such, it’s often the stage for major announcements affecting security professionals as well as the general public.

This year’s Black Hat did not disappoint, and featured significant new developments that will interest both macOS and iOS users.

Read on for our roundup of Black Hat 2019…

The macOS …

August 9, 2019 • 4 min read