Results for

Checklist 154: Should you put a Ring on it?

Checklist 154: Should you put a Ring on it?

On this edition of The Checklist we discuss Warnings from Facebook about warnings about Facebook, ‘Amazon, your neighbours, and the police wanna put a Ring on it’, and When smart things turn dumb.

September 12, 2019 • 8 min read
Apple Re-Patches Bug That Led to a Public iOS Jailbreak

Apple Re-Patches Bug That Led to a Public iOS Jailbreak

Over the last couple of weeks, both on the Checklist and on the news section of our site, we’ve been talking about the story of the big iOS jailbreak that was announced in August. This jailbreak was unusual in that it affected the most up-to-date version of iOS available—something we hadn’t seen in quite a while. 

Jailbreaking, as you’ll recall, is the process of removing Apple’s built-in safeguards and limitations on what users and software can do in iOS, essentially allowing them high-level administrative privileges that Apple never intended them to …

September 11, 2019 • 3 min read
Apple announces new iPhones—and the next generation of Apple Watch

Apple announces new iPhones—and the next generation of Apple Watch

This Tuesday, Apple held its much-anticipated media event. Here are a few key takeaways from the big day.

New iPhones!

The big news on Tuesday was, as expected, the announcement of the next generation of iPhones.

Apple is rolling out three new models: the iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max. The phones are priced at $699, $999, and $1099, respectively. The new devices will be available for pre-order on Friday and for purchase in Apple Stores by 20 September.

So what’s new? 

Not all that much (with a couple of important …

September 10, 2019 • 3 min read
5 Cybersecurity Tips for Study Abroad Students

5 Cybersecurity Tips for Study Abroad Students

Spending a semester or a year abroad can be a life-changing experience for college students. But while living in a strange new place is undoubtedly exciting, it can mean new safety challenges as well—and this includes cybersecurity.

September 8, 2019 • 5 min read
5 Ways to Improve Cybersecurity in Schools

5 Ways to Improve Cybersecurity in Schools

As we talked about in part 1 of this piece, the issue of cybersecurity in schools is significant—and doesn’t seem to be getting better.

So what steps can individual parents and concerned adults take to address such a huge problem? 

Here are 5 things you can do to help make schools more secure:

article span.backnum { font-family:”Open Sans”, sans-serif; font-size: 10rem; opacity: 0.3; line-height: 1; position:absolute; left: 1rem; top: 0;}
article ol.lg{list-style-type: none;}
article ol.lg li {padding-left: 9rem; position: relative; margin-left: 0;}
@media screen and (max-width: 39.9875em){
article ol.lg li {padding-left: 5rem;}
article span.backnum { font-family:”Open Sans”, sans-serif; …

September 4, 2019 • 4 min read
CrescentCore

CrescentCore

Type:
Malware

Platform:
Mac OS X

Last updated:
07/01/19 7:45 pm

Threat Level:
High

Description

CrescentCore is a trojan horse disguised as an Adobe Flash Player installer. The installer comes on a .dmg file: the same kind of disk image file that can be used to install a legitimate application. The malicious file is served to unsuspecting users as a download on infected websites. First discovered in June 2019, researchers have found CrescentCore on illegal filesharing sites as well as on websites appearing in high-ranking Google search results.

CrescentCore is notable for its sophisticated anti-detection features. Once downloaded, the malware …

September 3, 2019 • 2 min read
KeyStealDaemon

KeyStealDaemon

    • Type:
    • Malware
    • Platform:
    • Mac OS X
    • Last updated:
    • 07/01/19 7:40 pm
    • Threat Level:
    • High

Description

KeyStealDaemon is malware that tries to steal passwords stored in Keychain in unpatched versions of macOS.

KeyStealDaemon Threat Removal

MacScan can detect and remove KeyStealDaemon Malware from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.

Download MacScan

September 3, 2019 • 1 min read
A teacher’s guide to cybersecurity in the classroom

A teacher’s guide to cybersecurity in the classroom

It seems like cybersecurity issues are in the news all the time. From data breaches at major financial institutions to ransomware attacks on city governments, scarcely a week goes by without another disturbing story of digital disaster.

August 31, 2019 • 6 min read
Checklist 152: Sharing is Scaring

Checklist 152: Sharing is Scaring

On this edition of The Checklist: Convenience versus privacy on Yelp, Tips for staying digitally safe on campus, and Everybody needs to update their everything!

August 29, 2019 • 10 min read
Do schools have a cybersecurity problem?

Do schools have a cybersecurity problem?

We often think of financial institutions, corporations, and governments as the primary targets of cyberattacks. But are schools at risk as well?

The answer, unfortunately, is yes—and the problem is growing.

In this two-part article, we’ll provide you with an overview of the problem, as well as some actionable ideas for dealing with it.

The changing face of education

With state and local education budgets stretched thin, and faced with the challenges of preparing students for an increasingly tech-centric job market, school districts across the country have embraced technological solutions that promise to do …

August 28, 2019 • 4 min read
Apple AirDrop Vulnerability Broadcasts User Phone Numbers to Potential Attackers

Apple AirDrop Vulnerability Broadcasts User Phone Numbers to Potential Attackers

iPhone users who frequently use the AirDrop feature to share images, videos, or other files may unwittingly be broadcasting their phone numbers to people nearby. According to a recent Ars Technica report, a hacker would need to have a laptop and a “wireless packet sniffer” dongle to exploit the vulnerability. Armed with those components, a security researcher testing the proof-of-concept software designed to exploit the vulnerability was able to see “details of more than a dozen iPhones and Apple Watches that were within radio range” and use this information to …

August 24, 2019 • 3 min read
Checklist 151: Too Close for Security Comfort

Checklist 151: Too Close for Security Comfort

This week on the Checklist podcast, we’ll talk about how to deal with security risks that come from those closest to you (literally). We’ll take you through some bad iOS news from the past week, and also discuss how it relates to a larger issue related to mobile security. And finally, we revisit a familiar topic—passwords—and tell you about some newly released Google research that probably means we’ll have to keep talking about passwords for the foreseeable future. Here’s our weekly Checklist:

Protecting your data from the people – literally – …

August 22, 2019 • 12 min read
Careers In Cybersecurity

Careers In Cybersecurity

In the first part of this two-part series, we made the case for cybersecurity as a career path with excellent short and long-term growth prospects.

But what, exactly, do folks who work in cybersecurity do all day?

That’s what we’ll cover in this article. 

While the list of jobs won’t be exhaustive—cybersecurity, like any complex and growing field, has a wide array of opportunities—it will cover some of the most in-demand specializations and give a representative sampling of the kinds of jobs out there (along with a general idea of how much they …

August 19, 2019 • 4 min read
Checklist 150: Trust Issues

Checklist 150: Trust Issues

On this edition of The Checklist: The Siri Sessions, O.MG: A Cable Hack, and 15 Apps to Watch for on Kids’ Phones.

August 15, 2019 • 9 min read
Should you post pictures of your kids on social media?

Should you post pictures of your kids on social media?

Parents are proud of their kids, and it’s natural to want to share special moments from their lives with friends and family on social media. But a growing chorus of experts is warning that sharing too much of our children’s private lives can do real harm.

What you decide to put on social media is a personal decision…but it should be an informed decision. Here are five things to consider before posting those baby bathtime photos—along with some tips to protect your children’s privacy and help keep them safe.

article span.backnum { …

August 14, 2019 • 5 min read