
Checklist 147: Bill Barr and the Magic Door
On this edition of The Checklist: The AG Asks the Usual Impossible ,Keeping Kids Off of Dating Apps, and Security Fixes in the Latest Apple Updates.
July 25, 2019 • 12 min readOn this edition of The Checklist: The AG Asks the Usual Impossible ,Keeping Kids Off of Dating Apps, and Security Fixes in the Latest Apple Updates.
July 25, 2019 • 12 min readEstate planning is a sensitive subject. Yet making arrangements for what happens to your estate after you’re gone is important, as it ensures that your loved ones will receive what you intend to leave them without paying burdensome taxes or going through a lengthy legal process.
As technology permeates our world more and more, it is essential to consider your digital life as part of the estate planning process.
Here are four key things to think about when planning your digital legacy.
article span.backnum { font-family:”Open Sans”, sans-serif; font-size: 10rem; opacity: 0.3; line-height: …
July 24, 2019 • 4 min readBeing a mom or dad is hard. And these days, it seems like it’s harder than ever.
In addition to all the old challenges of raising happy and healthy kids, we have a host of new things to worry about as well. And one of the biggest of these is how to keep our children safe online.
Unfortunately, with the rise of smartphones and the proliferation of apps, it’s no longer as simple as putting the family computer in the middle of the living room. Some parents found this out the hard …
July 23, 2019 • 5 min readThe Internet of Things (IoT) continues to grow at a remarkable pace—with analysts predicting the global IoT market to be worth a staggering half a trillion dollars by 2021.
But experts have also noticed another IoT trend: dangerously lax security.
In this article, we’ll give you a little background to the security issues affecting the Internet of Things as well as a few simple steps you can take to make your home a safer place both today and in the years to come.
What is an IoT device?
Since we’re talking about the IoT …
July 18, 2019 • 5 min readOn this edition of The Checklist we talk about: Should YOU be running beta software? Should ANYONE block Apple’s silent updates? And should there REALLY be an app for your flatiron?
July 18, 2019 • 11 min readIn response to the discovery of a new critical bug in one of Apple’s own apps, the company has disabled some functionality in Apple Watches to protect users.
The issue lies with the Walkie-Talkie app, a default app on the Apple Watch designed to let users connect with one of their friends directly for “push to talk” chatting. Once a staple feature on older cell phones, Apple included Walkie-Talkie as a fun addition — yet it seems to have come with a not so fun side-effect of its own. Details are …
July 12, 2019 • 2 min readSummer’s here! The kids are out of school, the weather is gorgeous, and for many of us that means sun, fun, and family vacations.
July 11, 2019 • 4 min readOn this edition of The Checklist: A look at the Zoom for Mac vulnerability, OpenID raises questions over Sign in with Apple, and The UK issues some big GDPR fine.
July 11, 2019 • 11 min readSecurity researcher Jonathan Leitschuh has discovered a major vulnerability in the popular Zoom video conferencing app that could allow malicious actors to turn on your Mac’s camera without your permission.
July 10, 2019 • 4 min readSecurity researchers at Intego have discovered a new form of Mac malware—one that shows some surprisingly sneaky behaviour aimed at evading detection by antivirus software and human malware hunters alike.
July 8, 2019 • 4 min readThis week, we’re going to the movies! It’s our special summer security blockbusters edition of The Checklist, where we take a fun and whimsical look at some of the big technical concerns that pop up in our favorite movies and how they can relate to some real-life issues, too.
July 5, 2019 • 1 min readAmong the most fundamental security features on Macs, Gatekeeper is near the top of the list. A first line of defense against malicious software, Gatekeeper’s job is to verify code signatures, which ensures that the software you’re running is genuine and hasn’t been tampered with by outside forces. Gatekeeper also helps to keep unauthorized software from running without your permission and provides help to users through warning messages letting you know when something might not be safe. Recently, though, a security researcher named Filippo Cavallarin unveiled a flaw in Gatekeeper …
July 3, 2019 • 3 min read