Results for

What is geofencing?

What is geofencing?

Federal judges in the United States are starting to push back against police requests for “geofence warrants”, citing constitutional concerns. In this short article, we’ll introduce you to the issue, tell you what it means for your privacy, and explain how you can limit the ability of the government (and others) to track you.

What is geofencing?

Broadly speaking, geofencing refers to the practice of creating a virtual boundary around a real-world physical area. The technique is often used by marketers and advertisers who want to show more relevant ads or offer …

September 8, 2020 • 7 min read
Checklist 197: Staring at the Cloud with Dominique West

Checklist 197: Staring at the Cloud with Dominique West

On this Checklist, we talk with cloud security expert Dominique West. The conversation covers career paths in infosec, today’s changing threat landscape, common misconceptions about cloud security, and the importance of community to the industry.

September 3, 2020 • 15 min read
Guide to iOS 14 Privacy Features

Guide to iOS 14 Privacy Features

Apple will soon release iOS 14 to the public, and it has a number of important privacy enhancements that you should know about. In this guide, we’ll walk you through iOS 14’s privacy features, and give you tips and how-tos to help you make the most of them.

Data Sharing Controls

First up, we’ll take a look at some new features that let you control how (or if) you share your data with apps.

App tracking controls

This one is a real game-changer. Apps track us in a variety of ways, mostly so …

August 31, 2020 • 10 min read
Ransomware attacks by amateur Iranian hackers used “off-the-shelf” malware

Ransomware attacks by amateur Iranian hackers used “off-the-shelf” malware

Threat researchers are reporting that low-skilled Iranian hackers carried out a number of successful attacks against enterprise targets in June. The incident highlights the growing threat of off-the-shelf malware to businesses and individuals.

In this short article, we’ll tell you what happened, give you some background to the issue, and let you know what you can do to stay safe.

The incident

According to researchers at Singapore-based Group-IB, newbie hackers in Iran managed to penetrate the networks of a number of companies across the globe and infect their systems with Dharma ransomware. The …

August 31, 2020 • 6 min read
XCSSET: New Mac malware infects Xcode projects

XCSSET: New Mac malware infects Xcode projects

Security researchers have discovered an interesting new variety of macOS malware that spreads by attacking Xcode projects. It’s called XCSSET, and in this article, we’ll tell you what you need to know about this unusual threat in order to stay safe.

What is XCSSET?

XCSSET is a suite of malicious components that spreads through infected Xcode projects.

Xcode is a tool used by app developers to write software for Apple platforms. An Xcode “project” simply refers to the repository of files, information, and resources that are used to build an app for deployment.

If …

August 18, 2020 • 5 min read
DEF CON Safe Mode Highlights

DEF CON Safe Mode Highlights

DEF CON, a major annual event in the world of cybersecurity, was held just last week. This year, the organizers decided to go virtual, calling the event “DEF CON Safe Mode”. 

There were a number of great talks and panels at the conference, and while some of them were quite technical, many also focused on topics likely to be of interest to a wide audience. 

In what follows, we’ll offer some curated highlights from DEF CON Safe Mode that you may want to check out, along with links to the full video …

August 14, 2020 • 5 min read
Disinformation in the age of social media: Renée DiResta’s Black Hat 2020 keynote

Disinformation in the age of social media: Renée DiResta’s Black Hat 2020 keynote

Black Hat USA is a major event in the world of information security. This year, due to the ongoing pandemic, the conference went virtual — and the organizers offered open access to many of the most important talks and sessions. 

Among these were two timely keynote addresses that deal with issues around election security, one of which was delivered by Renée DiResta. DiResta is the Research Manager at Stanford Internet Observatory, an interdisciplinary program that studies the misuse of information technologies. Her work focuses on the way in which narratives spread …

August 12, 2020 • 8 min read
Election security in a pandemic: Matt Blaze’s Black Hat 2020 keynote

Election security in a pandemic: Matt Blaze’s Black Hat 2020 keynote

Black Hat USA is one of the biggest events in the world of cybersecurity, bringing the infosec community together once a year for several days of trainings, briefings, and demos. Due to COVID-19, Black Hat 2020 went fully remote, and offered free access to some of the conference’s most important events. 

Matt Blaze gave an extremely relevant keynote entitled “Stress-Testing Democracy: Election Integrity During a Global Pandemic”. Blaze is cryptographer and professor of computer science who holds the McDevitt Chair in Computer Science and Law at Georgetown University. His work focuses …

August 11, 2020 • 8 min read
Checklist WWDC20 Outtake

Checklist WWDC20 Outtake

We’re bringing you a WWDC outtake: an off-the-cuff, practically off-mic discussion of WWDCs past — as well as the roles Apple execs play.

August 6, 2020 • 3 min read
Chris Hadnagy on social engineering

Chris Hadnagy on social engineering

Chris Hadnagy is one of the world’s foremost authorities on social engineering. He has written four books on the topic, including Social Engineering: The Science of Human Hacking and Unmasking the Social Engineer: The Human Element of Security. Hadnagy has been a prominent figure in the security industry for many years, founding the popular Social Engineering Village (SEVillage) at DEF CON, and establishing the Innocent Lives Foundation, a non-profit organization that coordinates the resources of the infosec community to fight online child predators. Hadnagy’s company, Social-Engineer, LLC, helps …

August 3, 2020 • 27 min read
What is key-based 2FA?

What is key-based 2FA?

Standard 2FA has some important limitations, which is why many security experts believe that key-based 2FA is the wave of the future — especially now that Apple has made changes to make it much more accessible to iPhone and iPad users.

July 31, 2020 • 6 min read
Checklist 193: A Look at Apple Silicon with Nick Leon

Checklist 193: A Look at Apple Silicon with Nick Leon

Starting this year, Apple will begin making its own, ARM-based processors for the Mac. In this episode of The Checklist, we take a look at the background to this change, as well as what it means for Mac users:

Intel vs ARMApple Silicon Macs and performanceApple Silicon Macs and security

Goodbye Intel, Hello ARM

When Apple announced their move from the Intel to the ARM processor architecture, it was clearly big news. But it also left many folks with a pretty basic question: What’s the actual difference between the two?

At a hardware level, …

July 30, 2020 • 12 min read
Checklist 192: Twitter Hack 2020

Checklist 192: Twitter Hack 2020

A week behind us, the great Twitter hack is still unfolding. We’ll look at what we think we know so far and why the hack itself matters on this edition of The Checklist, brought to you by SecureMac.

July 23, 2020 • 6 min read
ARM Macs FAQ

ARM Macs FAQ

Apple will soon begin transitioning away from Intel CPUs and switching to ARM processors instead. In this article, we’ll try to answer frequently asked questions about the change, offering some context to Apple’s decision and explaining what it all means for Mac users — especially in terms of performance and security.

ARM vs Intel: What’s the difference?

To start with the obvious, there are two different companies involved: Arm Holdings and Intel. The two companies have significantly different business models. Intel is both a designer and manufacturer of processors, whereas Arm does …

July 17, 2020 • 10 min read
Checklist 191: TikTok Talk with Patrick Wardle

Checklist 191: TikTok Talk with Patrick Wardle

TikTok. Harmless fun? Or existential threat to the United States? The answer you get depends on who you ask. This week we have a special guest to help us discuss the question in depth — and we’ll get into the larger issues with apps, user data, and digital privacy.

TikTok, apps, and your privacy

In recent weeks, the popular video-sharing app TikTok has made headlines for its practice of monitoring iOS pasteboard data. The pasteboard — kind of a system-wide clipboard for iOS that lets apps access the information copied there — …

July 17, 2020 • 19 min read