Results for

Checklist 104: Guess Again! And Again! And Again!

Checklist 104: Guess Again! And Again! And Again!

It might seem like we have a thousand new security issues to talk about each week — but if you’ve been listening for a while, you know that’s pretty much par for the course these days. This week we have a plethora of stories about…

August 30, 2018 • 13 min read
Hacking Fax Machines? It Can Happen, and Mac Users Could Be Vulnerable

Hacking Fax Machines? It Can Happen, and Mac Users Could Be Vulnerable

The average person, when they think about fax machines, probably puts them into the same class of technology as dial-up Internet — old, obsolete, and supplanted by more advanced technology. That last component, though, isn’t really true for the humble fax. In fact, many industries,…

August 30, 2018 • 3 min read
Major macOS Mail App Harbors Major Vulnerabilities

Major macOS Mail App Harbors Major Vulnerabilities

How do you manage your email? For those who receive a high volume of messages every day and depend on their email for work purposes, answering this question is essential. Most stock mail clients don’t always offer the capabilities you need from them; for that…

August 28, 2018 • 2 min read
Checklist 103 Always Look a Gift Horse in the Mouth

Checklist 103 Always Look a Gift Horse in the Mouth

Last week, we spent most of our discussion shaking our heads. This week, we’ve got an update on one of those stories, a look at a frankly quite scary USB device that doubles as malware, and a look at just how much the government doesn’t…

August 23, 2018 • 10 min read
Checklist 102: The Head Shaking Edition

Checklist 102: The Head Shaking Edition

This week, we’ve dubbed our episode the “head shaking edition” because each of our stories today left us shaking our heads for one reason or another. From Google quietly looking over your shoulder to Comcast fumbling the ball with yet another big leak of user…

August 16, 2018 • 12 min read
Checklist 101: Picture Imperfect

Checklist 101: Picture Imperfect

The summer marches on, and so does the parade of headlines and security concerns. From sneaky websites pretending to be someone they are not, to creepy social media spying thanks to an old and supposedly broken phone, and onward to concerns about requests for your…

August 9, 2018 • 12 min read
Checklist 100: It’s Episode 100!

Checklist 100: It’s Episode 100!

It has been a long time coming, but we are proud to celebrate the milestone achievement of 100 episodes of The Checklist, brought to you by SecureMac! We’d like to take this moment to say a big “thank you” to our listeners, especially those who’ve…

August 2, 2018 • 11 min read
1Password Implements New Feature to Keep Travelers’ Passwords Safe

1Password Implements New Feature to Keep Travelers’ Passwords Safe

Over the past several years, international travel has become fraught with more privacy and security concerns than ever before. At many borders, including those in the United States, customs agents are increasingly asking travelers to unlock their phones and hand over their laptops for inspection….

July 30, 2018 • 2 min read
Checklist 99: I Saw What You Did!

Checklist 99: I Saw What You Did!

It’s time for another look into the world of security news, where we’ll talk about where Apple stores your sensitive data, the latest and strangest anti-spam efforts, and more. This week we’re narrowing our focus to look at how Apple is handling some of the…

July 26, 2018 • 14 min read
Apple’s July Security Updates Correct a Host of Problems

Apple’s July Security Updates Correct a Host of Problems

It’s that time again: Apple has pushed out a variety of updates for practically all its products, from iTunes for Windows to multiple flavors of macOS, plus the latest version of iOS 11.4. New security updates are also available for iCloud for Windows, Safari, watchOS,…

July 18, 2018 • 2 min read
Checklist 97: Privacy Nightmare at 30,000 Feet

Checklist 97: Privacy Nightmare at 30,000 Feet

In the past, we’ve spent a substantial amount of time talking about the business of security flaws. Usually, it centers around things such as selling personal data on the Dark Web after stealing it using exploits and attacks. Credit card details, names, and addresses, and…

July 12, 2018 • 12 min read
Checklist 96: The Latest Bugs, Flaws, and Privacy Worries

Checklist 96: The Latest Bugs, Flaws, and Privacy Worries

The summer keeps on heating up, so why not stay inside where it’s cool, and relax with the newest edition of The Checklist? As the temperatures outside climb, the headlines in the world of Mac security and beyond keep piling up too. This week, we’re…

July 5, 2018 • 18 min read
Apple Patches Bug in Swift Programming Language

Apple Patches Bug in Swift Programming Language

Apple’s Swift programming language is a useful tool for developers on Mac and iOS platforms due to its versatility and wide-reaching application. Occasionally, though, Apple uncovers issues within Swift that could unintentionally allow bad actors to make inroads towards attack execution. A new Swift module…

July 2, 2018 • 2 min read
Checklist 95: Summer Security News

Checklist 95: Summer Security News

It seems like it was just yesterday that we were kicking off the new year and wondering what the months ahead would have in store for us. As we head into the first sweltering days of summer, it’s safe to say that the first half…

June 28, 2018 • 17 min read
Hackers Could Bypass macOS Signature Checks for A Decade

Hackers Could Bypass macOS Signature Checks for A Decade

Code signing is one of the most important lines of defense against malware. It allows a user to know that the software they intend to install or run came from a trusted source, such as Apple, or another trusted developer. While code signing is not…

June 26, 2018 • 2 min read
Apple Patches Xcode to Correct Serious Git Security Flaw

Apple Patches Xcode to Correct Serious Git Security Flaw

How can programmers keep track of all the changes that get made to a piece of software during its development while keeping everyone else on the project in the loop? Answering that challenge is the purpose of what is known as a “version control system.”…

June 25, 2018 • 2 min read