Results for

How to set up an IoT gift for security

How to set up an IoT gift for security

It’s that time of year again, when kids and adults alike will soon be unwrapping presents and playing with new toys. But if you receive an Internet of Things (IoT) device as a gift, you may want to pay extra attention to the cybersecurity ramifications…

December 22, 2019 • 6 min read
Apple in 2019: Naughty or Nice?

Apple in 2019: Naughty or Nice?

It’s that time of year again, when Santa makes his list, checks it twice and, well, you know the rest. So in the spirit of the season, we’re going to take a look at some of the top Apple stories of 2019 to see if…

December 20, 2019 • 9 min read
Checklist 168: It only FEELS like a recap

Checklist 168: It only FEELS like a recap

This week’s Checklist topics may sound familiar, but don’t be fooled! We revisit three stories that we’ve talked about before, but which now have some updates worth discussing (spoiler: it’s not all good news!). On this week’s Checklist, it’s deja vu all over again: $20…

December 19, 2019 • 11 min read
Georgia Weidman on penetration testing and the future of cybersecurity

Georgia Weidman on penetration testing and the future of cybersecurity

Georgia Weidman is a penetration tester, security researcher, writer, trainer, and entrepreneur. She is the author of a highly-regarded book which teaches the fundamentals of penetration testing, Penetration Testing: A Hands-On Introduction to Hacking, and has taught security courses and conducted advanced training sessions at…

December 17, 2019 • 13 min read
Checklist 167: Apple updates all of it

Checklist 167: Apple updates all of it

Cupertino rolled out new features and bug fixes for all of its operating systems, so we’re going to take a look at last week’s security news broken down by OS.

December 12, 2019 • 8 min read
New fileless malware for macOS linked to Lazarus Group

New fileless malware for macOS linked to Lazarus Group

The new malware sample bears similarities to the well-known AppleJeus malware, which targets cryptocurrency exchanges. AppleJeus is the product of Lazarus Group, a shadowy cybercrime organization believed by many to be linked to North Korea.

December 10, 2019 • 6 min read
Setting up a new Mac for security: 7 tips and tricks

Setting up a new Mac for security: 7 tips and tricks

So you’re the proud owner of a brand new Mac — wonderful! You’re no doubt eager to try out all the bells and whistles; install your favorite apps; start using your new machine. We know the feeling. But part of setting up a new macOS…

December 3, 2019 • 10 min read
Checklist 165: Safe shopping for the holidays

Checklist 165: Safe shopping for the holidays

This week’s Checklist gets you ready for the seasonal shopping rush (from a cybersecurity perspective, anyway). We’ll show you how to keep safe as you shop online; what gifts you might want to avoid; and how to make sure everything arrives as planned; and what…

November 29, 2019 • 11 min read
Checklist 164: Over the River and Through the Woods

Checklist 164: Over the River and Through the Woods

A a complete guide to how to keep yourself safe during the holiday travel season. We’ll tell you what to do before you even walk out the door, how to protect yourself while you’re traveling, and what things to bear in mind when you reach your destination.

November 21, 2019 • 12 min read
5 Airbnb security and privacy tips

5 Airbnb security and privacy tips

Holiday travel season is almost here. And while many of us will be staying with family, friends, or in hotels, a growing number of people are making use of Airbnb to find lodging during the holidays. Airbnb rentals can be an excellent option for travellers:…

November 19, 2019 • 4 min read
Encrypted messaging apps: Everything you need to know

Encrypted messaging apps: Everything you need to know

Privacy is hard to come by these days. Malicious actors, large corporations, and governments are constantly trying to look over your shoulder when you’re online. But some in the tech community are fighting back. Tools like ad blockers, no-track browsers, and VPNs can help keep…

November 13, 2019 • 8 min read
Digital forensics and privacy: 3 things to know

Digital forensics and privacy: 3 things to know

Digital forensic analysts are the Sherlocks of cybersecurity, gathering and interpreting evidence from digital sources for use in criminal or civil court cases. While the field of digital forensics is an interesting topic in its own right, it’s also worth learning about if you’re interested…

November 11, 2019 • 8 min read
Checklist 162: Insecurity with a “light” touch

Checklist 162: Insecurity with a “light” touch

On this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out of a Hollywood thriller. Here’s the…

November 8, 2019 • 8 min read
7 Facts About Ransomware Attacks on Local Government

7 Facts About Ransomware Attacks on Local Government

High-profile ransomware attacks on city and state governments have made national and international news in the past year. Many people are left wondering how serious the problem is—and what, if anything, can be done about it.

November 7, 2019 • 4 min read