SecurityImagine if whenever you went to buy something — a car, perhaps — the information you handed over in the purchasing process became public record for anyone to see and search. All they’d have to do is plug your license plate in, and they’d be able to see your name, address, and phone number.
May 24, 2018 •
17 min read
SecuritySecurity researchers use many tools to conduct their work; in many cases, the best way to test a system is to try to break in, because it allows one to identify all the weaknesses and potential inroads a real hacker might exploit. These tools aren’t…
May 23, 2018 •
3 min read
SecurityEmail encryption is supposed to make the content of your emails safer, but according to a team of nine academic researchers, two of the most widely used encryption standards might be doing the opposite. In a tweet sent on May 14, 2018, Sebastian Schinzel, a…
May 21, 2018 •
3 min read
SecurityThe General Data Protection Regulation, or GDPR, is a new set of European Union rules that govern the ways businesses and online organizations treat user information, in particular the data belonging to EU citizens. The GDPR introduces a wide range of regulations, chief among them new restrictions on how third parties can process, store, and handle user information.
May 18, 2018 •
3 min read
SecurityThere are some items of technology in our lives that are so standard and ubiquitous because of how fundamental they are to the way things work that it’s very easy to take them for granted. Because we don’t pay a second thought to these things,…
May 17, 2018 •
15 min read
SecurityOnly a few weeks after the recent release of macOS High Sierra 10.13.4, Apple has amended the update by publishing an additional fix under this version number. Addressing a new flaw described as “serious” by the security community, the supplemental version of 10.13.4 addresses a…
May 16, 2018 •
2 min read
SecurityHow do you unlock your iPhone when you need to use it? Apple gives us a ton of options when it comes to keeping our information safe from prying eyes and unwanted intruders, from PINs to our fingerprints and our faces. Apple’s commitment to empowering…
May 10, 2018 •
12 min read
SecurityWelcome to Episode 87. Last week, we took an in-depth look at data breaches: from how they happen to a few of the biggest ones, and of course, what you can do to protect yourself when a big company loses your data, we covered a…
May 7, 2018 •
14 min read
SecurityDuring the course of your day, buy things, like gas, food, & lodging. Do you pay cash for all those things — or do you try to go back in time and operate on the barter system? Even if you do most of your business…
April 26, 2018 •
13 min read
SecurityWhen you log on to Facebook, do you still feel like you’re having fun? The social network used to be an awesome place to reconnect with old friends and keep in touch with family. Today, more people than ever are choosing #DeleteFacebook. While Facebook is…
April 19, 2018 •
17 min read
SecurityMachine learning. Deep learning. Neural networks. Artificial intelligence… it’s starting to feel like we’re in an Isaac Asimov novel! For this week’s episode of The Checklist, we’re diving in to the latest ways computers and technology are being trained to complete complex tasks, make inferences,…
April 12, 2018 •
15 min read
SecurityAfter more than a month since the last big “patch day” for Apple products, the Cupertino company has now released to the public a new slew of updates that bring with them both new features and enhanced security. Covering everything from a new and essential…
April 9, 2018 •
2 min read
SecurityIt’s that time again — time for us to pull back for a “big picture” look at some of the big missteps in computer security over the recent weeks and months. Some of today’s stories relate to Apple, some don’t, but all of them fall into the category of a classic “security fail.”
April 5, 2018 •
17 min read
SecurityMalware and vulnerabilities have roared in early in 2018. On this week’s Checklist by SecureMac, three hazards and two helpers about which you should know.
March 29, 2018 •
18 min read
SecurityLas Vegas, Nevada — Concern for personal privacy in the digital world is at an all-time high, and with prominent stories about data breaches and leaks on the rise, users are right to want to take better control of their data. However, Mac users today…
March 23, 2018 •
3 min read
SecurityFor several years now, a fierce debate has raged over how much access law enforcement organizations (LEOs) should be able to have to the mobile devices of those suspected of a crime. The issue made nationwide headlines after the San Bernardino attacks in 2015, when the FBI grappled with how to break into an iPhone used by one of the perpetrators. While the FBI did eventually retrieve device data by utilizing an unknown group to gain access to the phone’s encrypted contents, law enforcement agencies, in general, have maintained that they must have a “backdoor” to access info secured by your iPhone passcode. Apple has steadfastly refused to give in to such demands, but it appears that for now, those refusals don’t matter: LEOs can now use a pricey piece of hardware called GrayKey.
March 22, 2018 •
3 min read
SecurityIf you’ve been listening to the news recently, you’ve probably heard the name “Cambridge Analytica” come up — and all kinds of stories about the data firm’s former executives claiming they could manipulate and intimidate large numbers of people with crafted, targeted social media content.
March 22, 2018 •
18 min read
SecurityThe wave of cryptocurrency miners taking the place of common malware continues in 2018 unabated, and it appears every week we encounter another story about a website running surreptitious miners or a company looking for ways to use your CPU resources. As Mac users, we…
March 19, 2018 •
3 min read
SecurityFor all our listeners of The Checklist, it is no secret that we are strong advocates for security. Usually, we come on this show to talk about how to secure your digital life and keep unauthorized individuals from snooping through your information. Security is important,…
March 15, 2018 •
16 min read
SecurityLast year, we visited the subject of Bitcoin and the technology behind it, the blockchain, in Episode 59 of The Checklist. In just a few short months since that episode, the price of one Bitcoin exploded, hundreds of new cryptocurrencies appeared, and company after company…
March 8, 2018 •
18 min read