Results for

Checklist 90: WHOIS GDPR: A Primer

Checklist 90: WHOIS GDPR: A Primer

Imagine if whenever you went to buy something — a car, perhaps — the information you handed over in the purchasing process became public record for anyone to see and search. All they’d have to do is plug your license plate in, and they’d be able to see your name, address, and phone number.

May 24, 2018 • 17 min read
New European Privacy Laws Have Ripple Effect on Online Privacy

New European Privacy Laws Have Ripple Effect on Online Privacy

The General Data Protection Regulation, or GDPR, is a new set of European Union rules that govern the ways businesses and online organizations treat user information, in particular the data belonging to EU citizens. The GDPR introduces a wide range of regulations, chief among them new restrictions on how third parties can process, store, and handle user information.

May 18, 2018 • 3 min read
Checklist 89: Router Rundown

Checklist 89: Router Rundown

There are some items of technology in our lives that are so standard and ubiquitous because of how fundamental they are to the way things work that it’s very easy to take them for granted. Because we don’t pay a second thought to these things,…

May 17, 2018 • 15 min read
Checklist 88: GrayKey’s Anatomy

Checklist 88: GrayKey’s Anatomy

How do you unlock your iPhone when you need to use it? Apple gives us a ton of options when it comes to keeping our information safe from prying eyes and unwanted intruders, from PINs to our fingerprints and our faces. Apple’s commitment to empowering…

May 10, 2018 • 12 min read
Checklist 87: The Anatomy of a Data Breach, Part 2

Checklist 87: The Anatomy of a Data Breach, Part 2

Welcome to Episode 87. Last week, we took an in-depth look at data breaches: from how they happen to a few of the biggest ones, and of course, what you can do to protect yourself when a big company loses your data, we covered a…

May 7, 2018 • 14 min read
Checklist 86: The Anatomy of a Data Breach, Part 1

Checklist 86: The Anatomy of a Data Breach, Part 1

During the course of your day, buy things, like gas, food, & lodging. Do you pay cash for all those things — or do you try to go back in time and operate on the barter system? Even if you do most of your business…

April 26, 2018 • 13 min read
Checklist 85: Facebook Follies

Checklist 85: Facebook Follies

When you log on to Facebook, do you still feel like you’re having fun? The social network used to be an awesome place to reconnect with old friends and keep in touch with family. Today, more people than ever are choosing #DeleteFacebook. While Facebook is…

April 19, 2018 • 17 min read
Latest Round of Apple Security Updates Includes iOS 11.3

Latest Round of Apple Security Updates Includes iOS 11.3

After more than a month since the last big “patch day” for Apple products, the Cupertino company has now released to the public a new slew of updates that bring with them both new features and enhanced security. Covering everything from a new and essential…

April 9, 2018 • 2 min read
Checklist 83: More Security Fails

Checklist 83: More Security Fails

It’s that time again — time for us to pull back for a “big picture” look at some of the big missteps in computer security over the recent weeks and months. Some of today’s stories relate to Apple, some don’t, but all of them fall into the category of a classic “security fail.”

April 5, 2018 • 17 min read
Police Can Now Access iPhone Data Using a Secretive Piece of Hardware

Police Can Now Access iPhone Data Using a Secretive Piece of Hardware

For several years now, a fierce debate has raged over how much access law enforcement organizations (LEOs) should be able to have to the mobile devices of those suspected of a crime. The issue made nationwide headlines after the San Bernardino attacks in 2015, when the FBI grappled with how to break into an iPhone used by one of the perpetrators. While the FBI did eventually retrieve device data by utilizing an unknown group to gain access to the phone’s encrypted contents, law enforcement agencies, in general, have maintained that they must have a “backdoor” to access info secured by your iPhone passcode. Apple has steadfastly refused to give in to such demands, but it appears that for now, those refusals don’t matter: LEOs can now use a pricey piece of hardware called GrayKey.

March 22, 2018 • 3 min read
Checklist 81: Facebook’s Privacy Failures Leave You in the Cold

Checklist 81: Facebook’s Privacy Failures Leave You in the Cold

If you’ve been listening to the news recently, you’ve probably heard the name “Cambridge Analytica” come up — and all kinds of stories about the data firm’s former executives claiming they could manipulate and intimidate large numbers of people with crafted, targeted social media content.

March 22, 2018 • 18 min read
Some Apps on the Mac App Store Are Mining Cryptocurrency

Some Apps on the Mac App Store Are Mining Cryptocurrency

The wave of cryptocurrency miners taking the place of common malware continues in 2018 unabated, and it appears every week we encounter another story about a website running surreptitious miners or a company looking for ways to use your CPU resources. As Mac users, we…

March 19, 2018 • 3 min read
The Checklist 80:  Digital Legacies

The Checklist 80: Digital Legacies

For all our listeners of The Checklist, it is no secret that we are strong advocates for security. Usually, we come on this show to talk about how to secure your digital life and keep unauthorized individuals from snooping through your information. Security is important,…

March 15, 2018 • 16 min read
Checklist 79: Cryptocurrency and Your Web Browser

Checklist 79: Cryptocurrency and Your Web Browser

Last year, we visited the subject of Bitcoin and the technology behind it, the blockchain, in Episode 59 of The Checklist. In just a few short months since that episode, the price of one Bitcoin exploded, hundreds of new cryptocurrencies appeared, and company after company…

March 8, 2018 • 18 min read