Results for

Sign in with Apple: Digital privacy at last?

Sign in with Apple: Digital privacy at last?

At this year’s Worldwide Developers Conference, Apple announced several forthcoming changes aimed at improving privacy and security for its users. Perhaps the most important of these was “Sign in with Apple”, slated for widespread release later this year.

In this post, we’ll talk about what Sign in with Apple is, why it matters…and whether or not it’s all it’s cracked up to be.

What is Sign in with Apple?

Many apps ask users to sign-in with a social media account, ostensibly in order to offer a more personalized experience. You’ve probably seen or …

August 14, 2019 • 4 min read
Are Cybersecurity Skills In Demand?

Are Cybersecurity Skills In Demand?

As millions of students head back to university this fall, a substantial chunk of them will do so without knowing what they’re actually going to end up studying.

For most undeclared majors, the final decision is going to come down to career prospects: whether or not they’ll be able to find a job after graduation.

Of course, nobody knows exactly what the economy is going to be doing (or not doing) in four years, but the best hedge against uncertainty has always been to figure out what skills are in demand—and learn …

August 12, 2019 • 3 min read
Black Hat 2019: Apple’s $1 million prize, new vulnerabilities revealed, and a keynote to remember

Black Hat 2019: Apple’s $1 million prize, new vulnerabilities revealed, and a keynote to remember

The 22nd annual Black Hat USA conference was held this week in Las Vegas. Black Hat is one of the most important events in cybersecurity, bringing together researchers, developers, and hackers from all over the world for a week of training sessions and briefings. As such, it’s often the stage for major announcements affecting security professionals as well as the general public.

This year’s Black Hat did not disappoint, and featured significant new developments that will interest both macOS and iOS users.

Read on for our roundup of Black Hat 2019…

The macOS …

August 9, 2019 • 4 min read
Checklist 149: Security Tripping with The Checklist

Checklist 149: Security Tripping with The Checklist

This week, we say hello to August with a groan as news of more big data breaches that could affect our financial lives comes out. Then we’ll pivot to talk about how you can stay safe when you squeeze in one last summer vacation before autumn arrives, and we’ll round things out with a follow-up to a follow-up. It’s in the name of the show — so here’s this week’s checklist of stories:

The Bad/Worse Breach7 Tips for TripsA Stronger Little Snitch

Let’s not waste any time as we embark on a …

August 8, 2019 • 10 min read
The DataSpii Privacy Disaster: How Browser Extensions Resulted in a Huge Sensitive Data Leak

The DataSpii Privacy Disaster: How Browser Extensions Resulted in a Huge Sensitive Data Leak

If you use Google Chrome or Mozilla Firefox as your go-to web browser, and you regularly make use of browser extensions, then some of your browsing data may have been compromised. According to a detailed Ars Technica report on the matter—which is being referred to as “DataSpii’—more than four million users have likely been affected. 

The fault lies with eight different browser extensions, meant for everything from getting past paywalls to zooming in on web content. The way these extensions were set up allowed them to access and collect a wide …

August 3, 2019 • 3 min read
Flaw in Bluetooth Protocols Could Allow Tracking of iPhone, MacBook Users

Flaw in Bluetooth Protocols Could Allow Tracking of iPhone, MacBook Users

Bluetooth is one of the most common wireless protocols in the world, allowing a vast range of devices to connect together for shared functionality. From playing music in your car to controlling the temperature of your flatiron, Bluetooth enables us to do many things — and as a result, Bluetooth protocols are standard on iPhones, in MacBooks, and in many other products, too. According to a new study published by researchers from Boston University, though, almost all those devices currently contain a Bluetooth flaw that can erase a user’s privacy.

Bluetooth’s …

August 2, 2019 • 3 min read
Digital Privacy and Relationships

Digital Privacy and Relationships

From sneaking a peek at a partner’s texts to logging into their Facebook account while they’re sleeping, people will go to surprising lengths to see what their significant others are doing online.

August 1, 2019 • 4 min read
Planning your digital legacy

Planning your digital legacy

Estate planning is a sensitive subject. Yet making arrangements for what happens to your estate after you’re gone is important, as it ensures that your loved ones will receive what you intend to leave them without paying burdensome taxes or going through a lengthy legal process. 

As technology permeates our world more and more, it is essential to consider your digital life as part of the estate planning process.

Here are four key things to think about when planning your digital legacy.

article span.backnum { font-family:”Open Sans”, sans-serif; font-size: 10rem; opacity: 0.3; line-height: …

July 24, 2019 • 4 min read
Five ways to keep your kids off dating apps

Five ways to keep your kids off dating apps

Being a mom or dad is hard. And these days, it seems like it’s harder than ever.

In addition to all the old challenges of raising happy and healthy kids, we have a host of new things to worry about as well. And one of the biggest of these is how to keep our children safe online.

Unfortunately, with the rise of smartphones and the proliferation of apps, it’s no longer as simple as putting the family computer in the middle of the living room. Some parents found this out the hard …

July 23, 2019 • 5 min read
Securing your IoT home

Securing your IoT home

The Internet of Things (IoT) continues to grow at a remarkable pace—with analysts predicting the global IoT market to be worth a staggering half a trillion dollars by 2021.

But experts have also noticed another IoT trend: dangerously lax security.

In this article, we’ll give you a little background to the security issues affecting the Internet of Things as well as a few simple steps you can take to make your home a safer place both today and in the years to come.

What is an IoT device?

Since we’re talking about the IoT …

July 18, 2019 • 5 min read
Checklist 146: Just Because You Can…

Checklist 146: Just Because You Can…

On this edition of The Checklist we talk about: Should YOU be running beta software? Should ANYONE block Apple’s silent updates? And should there REALLY be an app for your flatiron?

July 18, 2019 • 11 min read
Apple Switches Off Apple Watch Walkie-Talkies to Nix Eavesdropping Bug

Apple Switches Off Apple Watch Walkie-Talkies to Nix Eavesdropping Bug

In response to the discovery of a new critical bug in one of Apple’s own apps, the company has disabled some functionality in Apple Watches to protect users. 

The issue lies with the Walkie-Talkie app, a default app on the Apple Watch designed to let users connect with one of their friends directly for “push to talk” chatting. Once a staple feature on older cell phones, Apple included Walkie-Talkie as a fun addition — yet it seems to have come with a not so fun side-effect of its own. Details are …

July 12, 2019 • 2 min read
Checklist 145: Zooming on Through

Checklist 145: Zooming on Through

On this edition of The Checklist: A look at the Zoom for Mac vulnerability, OpenID raises questions over Sign in with Apple, and The UK issues some big GDPR fine.

July 11, 2019 • 11 min read
New Mac Malware Knows When You’re Watching

New Mac Malware Knows When You’re Watching

Security researchers at Intego have discovered a new form of Mac malware—one that shows some surprisingly sneaky behaviour aimed at evading detection by antivirus software and human malware hunters alike.

July 8, 2019 • 4 min read
Checklist 144: Summer Security Blockbusters

Checklist 144: Summer Security Blockbusters

This week, we’re going to the movies! It’s our special summer security blockbusters edition of The Checklist, where we take a fun and whimsical look at some of the big technical concerns that pop up in our favorite movies and how they can relate to some real-life issues, too.

July 5, 2019 • 1 min read
Sneaky Gatekeeper Flaw Could Let Hackers Run Malware on Macs

Sneaky Gatekeeper Flaw Could Let Hackers Run Malware on Macs

Among the most fundamental security features on Macs, Gatekeeper is near the top of the list. A first line of defense against malicious software, Gatekeeper’s job is to verify code signatures, which ensures that the software you’re running is genuine and hasn’t been tampered with by outside forces. Gatekeeper also helps to keep unauthorized software from running without your permission and provides help to users through warning messages letting you know when something might not be safe. Recently, though, a security researcher named Filippo Cavallarin unveiled a flaw in Gatekeeper …

July 3, 2019 • 3 min read