SecurityChecklist 57: SecureMac Roundup: More Questions from Our Listeners
Part 1 of a 2 episode series where we go over various questions from our listeners!
October 5, 2017 • 18 min read
SecurityPart 1 of a 2 episode series where we go over various questions from our listeners!
October 5, 2017 • 18 min read
SecurityThis past May, a malicious software attack known as WannaCrypt (or WannaCry, depending on your source) hit the computer systems at major organizations and businesses around the globe. WannaCrypt is a ransomware attack. Once it infects a machine or computer system, it encrypts all the data hosted on those machines. (Hence the name WannaCrypt.)
Once the files are encrypted, the attack prompts the owner of the machine or computer system to pay a ransom to unlock the data. The ransom offer has a time limit, giving users a …
October 1, 2017 • 3 min read
SecurityWhile the iPhone’s fingerprint scanner and its associated TouchID functionality provide a wealth of convenience to users, it also brings some unique security challenges. Biometric data is one of the most personally identifiable and irreplaceable types of information out there. While someone who steals your fingerprint data may not be able to unlock many doors right now, that doesn’t mean it will always be the case. As a result, Apple put serious effort into developing a method for securely handling the verification of fingerprint data. The result was the …
September 29, 2017 • 2 min read
SecurityThis week, we’re tackling threats to your online privacy as well as online threats to your physical privacy.
September 28, 2017 • 19 min read
SecurityFor power users, nothing is quite as useful in the macOS ecosystem as the Terminal app. Whether you are working on a simple project or trying to create extensively customized functionality for your machine, it opens many doors for the savvy user. Those same users sometimes find the default Terminal app to be lacking, though, and thus alternatives, like the popular iTerm2 software, have sprung up over the years. With a recently issued security patch, however, the developer of iTerm2 acknowledged that the program had been leaking all kinds …
September 28, 2017 • 3 min read
SecurityAre you thinking about upgrading your iPhone this fall—either to the standard iPhone 8/8 Plus or the luxury model iPhone X? If so, you’re in luck: Elcomsoft has already updated its Phone Breaker software to support the new phones. Elcomsoft Phone Breaker 8.0 includes support for iOS 11 and will allow for backup data extraction from Apple’s iPhone 8 and iPhone X models.
Why Use Elcomsoft Phone Breaker?
Elcomsoft Phone Breaker has been a favorite tool among iOS users for a little while now. After all, the new incarnation …
September 26, 2017 • 3 min read
SecuritySeptember 19, 2017, marked the arrival of iOS 11, just in time for the release of the iPhone 8 and 8 Plus. The big annual update of Apple’s mobile operating system added a few new features into the mix for users, from a brand new Control Center to a keyboard made for one-handed texting.
However, amidst the new features, it turns out that iOS 11 is also an important security update. The updated operating system includes important patches for a variety of iOS vulnerabilities. Apple also patched bugs …
September 25, 2017 • 3 min read
SecurityOf all the major cyber security threats out there today, few are as frustrating and complicated to contend with as botnets. From the malware that spreads the infection from device to device, enslaving them to a remote command and control server, to the many malicious purposes hackers use them for, they’re a tough threat to combat. Recently, however, the security community got a firsthand look at the value of collaborating to take down threats to users. Six firms set aside the competitiveness of their industry to work together to …
September 25, 2017 • 2 min read
SecurityDoes it seem like your spam folder fills up almost as soon as you empty it? That’s true for many of us, but where is all that spam coming from these days? The answer is that surprisingly few people are involved in the sending of most of the spam on the web. With anti-spam efforts growing stronger every year, new methods have risen to the forefront, and spam is deeply entangled with many of the other malicious efforts ongoing around the Web. Spambots — malware that gathers together data …
September 22, 2017 • 2 min read
SecurityThe “S” in HTTPS stands for secure. But why? And how does it work? All you need to know about secure browsing.
September 21, 2017 • 17 min read
SecurityIf you feel like you’ve been getting more email spam than usual lately, you’re probably right. According to a recent report from Fortune, a sophisticated spambot called “Onliner” has figured out a way to bypass spam filters and has used that advantage to target some 711 million email addresses.
About the Onliner Spambot Attack
Onliner sends emails to users, disguised as stuff they would usually open—such as hotel reservation info, communications from the government, and more. Each email includes an attachment. If a user downloads the attachment, malware called Ursnif …
September 20, 2017 • 3 min read
SecurityFor years, tech enthusiasts have been calling the Internet of Things “the future of technology.” But is it? On the one hand, there is some appeal to a world where everything is digitally connected. Being able to control your home’s lights, thermostat, irrigation system, security system, and a slew of other appliances and systems from your home is convenient and useful. Business enterprises can also use IoT solutions to collect data on everything from concrete strength to wastewater treatment.
Simply put, the Internet of Things is already making …
September 19, 2017 • 3 min read
SecurityThe personal information of 143-million people may have been compromised when the consumer credit reporting agency Equifax was hacked. What do we know about the attack? And what can we do going forward?
September 18, 2017 • 16 min read
SecuritySince the addition of the fingerprint reader to the iPhone, the convenience of Touch ID has been hard to deny. From unlocking our phones to instantly authorizing an in-app purchase, it’s a rapid and convenient way to authenticate yourself to your device. Now with iOS 11 just around the corner, Apple has been dropping many announcements about what will be a part of the new operating system. Meanwhile, developers have discussed what they’ve experienced in the beta builds. One of the most exciting recent developments is the news that …
September 18, 2017 • 2 min read
SecurityWe know that an unsecured Internet of Things (IoT) thing like a light bulb or a web-connected picture frame can become part of a botnet or a dedicated denial of service attack. But how does that happen? That’s the topic of today’s show.
September 13, 2017 • 17 min read
SecurityMughthesec is adware.
MacScan can detect and remove Mughthesec Adware from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
September 1, 2017 • 1 min read
SecurityPwnet is a trojan horse that comes disguised as a hack for the videogame Counter-Strike: Global Offensive. Once installed, it can mine cryptocurrency and send it to the malware author.
MacScan can detect and remove Pwnet Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
September 1, 2017 • 1 min read
SecurityWith malicious networks using tens of millions of computers and devices to serve up spam, run denial of service attacks, and more, botnets are a threat we can’t ignore.
August 31, 2017 • 18 min read
SecurityCheating in online video games is nothing new — it’s been an almost permanent fixture of the scene for years. Despite consistent anti-cheat efforts, new hacks continue to crop up for popular games all the time. It’s an arms race, much in the same way security researchers and malware authors battle against each other on a regular basis. Dabbling in these hacks has always been risky business; after all, how can you trust the author to provide the cheat you want, without some nasty extras packaged inside?
The reality …
August 30, 2017 • 3 min read
SecurityToday, we are looking at five of the biggest data breaches and most notable hacks in history. Who got hit? What data was stolen? How did they happen?
August 24, 2017 • 18 min read