Results for

How to buy safe IoT gifts

How to buy safe IoT gifts

Internet of Things (IoT) devices can make great gifts, but the IoT in general is notoriously insecure — and with IoT threats on the rise, that’s a real cause for concern.

November 23, 2020 • 4 min read
Checklist 208: Safe Shopping Online in 2020

Checklist 208: Safe Shopping Online in 2020

The holiday season is here again…but this year, of course, is a little bit different. With more of us shopping from home than ever before, we’ll show you the safest ways to buy gifts online. On this Checklist, we cover: 5 best practices for 2020…

November 19, 2020 • 8 min read
Hackers at 25 with Renoly Santiago

Hackers at 25 with Renoly Santiago

The film marks its 25th anniversary this year, and we caught up with Santiago to talk about the making of Hackers; the movie’s enduring legacy, and what it means to him personally; and the relationship between technology and the arts

November 13, 2020 • 15 min read
Checklist 207: Privacy and Security in macOS Big Sur

Checklist 207: Privacy and Security in macOS Big Sur

macOS Big Sur has arrived. Or, we’ve gotten to Big Sur. Whatever the case, there’s a host of new privacy and security features in the Mac’s latest operating system. We’re talking over some of them with SecureMac’s Nick Leon on Checklist 207.

November 12, 2020 • 8 min read
Shopping extensions and your security

Shopping extensions and your security

We browser extensions that function as digital shopping assistants are becoming increasingly popular, but like any piece of software, shopping extensions have potential security ramifications.

November 12, 2020 • 5 min read
Is Apple building a search engine?

Is Apple building a search engine?

The web is abuzz with rumors that Apple is poised to challenge Google’s search supremacy. In this short article, we’ll tell you why people think Cupertino may be building a search engine of its own, and say what it could mean for the future of…

October 30, 2020 • 4 min read
U.S. officials say Iran was behind voter intimidation emails

U.S. officials say Iran was behind voter intimidation emails

Voters in several U.S. states have received threatening emails telling them to vote for incumbent presidential candidate Donald Trump, and vowing to “come after” them if they do not comply. U.S. officials now say that Iran was behind the emails, and that their goal was…

October 23, 2020 • 7 min read
Checklist 204: Cybercrime and the 2020 Election

Checklist 204: Cybercrime and the 2020 Election

The 2020 U.S. elections are just days away, and cybercriminals — some motivated by politics, others by financial gain — are stepping up their attacks. We’ll let you know what’s happening on this edition of the Checklist. Voter intimidation emails attributed to Iran We’ve talked…

October 22, 2020 • 8 min read
Checklist 203: T2, Revisited Plus an Actual Checklist

Checklist 203: T2, Revisited Plus an Actual Checklist

On this week’s Checklist, we’ll cover: How Macs are perceived in the enterpriseAn addendum to last week’s T2 storyA checklist of security tips from the NCSA Survey says… Do you feel like your Mac is the best choice for security? You’re not alone. A recent…

October 15, 2020 • 10 min read
5G iPhones and more at Apple’s October Event

5G iPhones and more at Apple’s October Event

Tuesday’s Apple Special Event introduced the iPhone 12 line and some cool new accessories as well. Here’s an overview of the new and upcoming product releases announced at the event: iPhone 12 and iPhone 12 mini The look of the new iPhone is reminiscent of…

October 14, 2020 • 5 min read
U.S. Cyber Command attacks hackers

U.S. Cyber Command attacks hackers

Amid growing concern about foreign interference in the November elections, military hackers at the United States Cyber Command have started attacking the Trickbot botnet. In this short article, we’ll tell you what’s happening and why it matters for the elections. What is the Trickbot botnet?…

October 12, 2020 • 4 min read
Notes from VB2020 localhost

Notes from VB2020 localhost

The annual Virus Bulletin security conference was held last week; as has been the case with so many other events this year, the proceedings were fully remote, leading the organizers to call the 2020 instalment of the conference “VB2020 localhost”.

October 8, 2020 • 7 min read
Checklist 202: The T2 Vulnerability with Patrick Wardle

Checklist 202: The T2 Vulnerability with Patrick Wardle

This week’s big news: an “unpatchable” hardware vulnerability affecting Apple’s T2 security chip! But how serious is it, really? We spoke with Mac security expert Patrick Wardle to separate the facts from the clickbait headlines. We’ll cover: the technical backgroundwho’s impacted (and what they can…

October 8, 2020 • 5 min read
Russian APT Fancy Bear may have compromised federal agency

Russian APT Fancy Bear may have compromised federal agency

An unnamed U.S. federal agency has been breached, according to a recent report by the Cybersecurity and Infrastructure Security Agency (CISA), and third-party analysts now believe that Fancy Bear, the notorious Russian Advanced Persistent Threat (APT) group, is the likely culprit.  In this short article,…

October 6, 2020 • 6 min read