Results for

Police Can Now Access iPhone Data Using a Secretive Piece of Hardware

Police Can Now Access iPhone Data Using a Secretive Piece of Hardware

For several years now, a fierce debate has raged over how much access law enforcement organizations (LEOs) should be able to have to the mobile devices of those suspected of a crime. The issue made nationwide headlines after the San Bernardino attacks in 2015, when the FBI grappled with how to break into an iPhone used by one of the perpetrators. While the FBI did eventually retrieve device data by utilizing an unknown group to gain access to the phone’s encrypted contents, law enforcement agencies, in general, have maintained that they must have a “backdoor” to access info secured by your iPhone passcode. Apple has steadfastly refused to give in to such demands, but it appears that for now, those refusals don’t matter: LEOs can now use a pricey piece of hardware called GrayKey.

March 22, 2018 • 3 min read
Checklist 81: Facebook’s Privacy Failures Leave You in the Cold

Checklist 81: Facebook’s Privacy Failures Leave You in the Cold

If you’ve been listening to the news recently, you’ve probably heard the name “Cambridge Analytica” come up — and all kinds of stories about the data firm’s former executives claiming they could manipulate and intimidate large numbers of people with crafted, targeted social media content.

March 22, 2018 • 18 min read
Some Apps on the Mac App Store Are Mining Cryptocurrency

Some Apps on the Mac App Store Are Mining Cryptocurrency

The wave of cryptocurrency miners taking the place of common malware continues in 2018 unabated, and it appears every week we encounter another story about a website running surreptitious miners or a company looking for ways to use your CPU resources. As Mac users, we…

March 19, 2018 • 3 min read
The Checklist 80:  Digital Legacies

The Checklist 80: Digital Legacies

For all our listeners of The Checklist, it is no secret that we are strong advocates for security. Usually, we come on this show to talk about how to secure your digital life and keep unauthorized individuals from snooping through your information. Security is important,…

March 15, 2018 • 16 min read
Checklist 79: Cryptocurrency and Your Web Browser

Checklist 79: Cryptocurrency and Your Web Browser

Last year, we visited the subject of Bitcoin and the technology behind it, the blockchain, in Episode 59 of The Checklist. In just a few short months since that episode, the price of one Bitcoin exploded, hundreds of new cryptocurrencies appeared, and company after company…

March 8, 2018 • 18 min read
Apple Patches Yet Another Phone-Crashing Text Bug

Apple Patches Yet Another Phone-Crashing Text Bug

We’ve recently seen a series of bugs on iOS and macOS devices that all follow a similar pattern: maliciously-formed links or simple emojis and text strings that cause the device to lock up and crash, sometimes repeatedly. A number of these issues have been fixed…

February 26, 2018 • 2 min read
The Checklist 77: Mix and Match Part II

The Checklist 77: Mix and Match Part II

As 2018 continues, so does the flood of new stories, threats, and developments in the security world. Just recently, we reached into the grab bag to take a quick look at a variety of different stories; this week, we’re going back again to pull out a mixture of the most prominent topics making a splash in the headlines over the past couple of weeks. From the consequences of tracking your exercise with an app to the pitfalls of perfectly proper grammar, we’ve got a lot of ground to cover in today’s show

February 22, 2018 • 17 min read
iPhone Source Code Leak Could Open the Floodgates for Hackers

iPhone Source Code Leak Could Open the Floodgates for Hackers

A key piece of Apple’s iPhone source code may be out in the wild. On February 7, someone posted something called “iBoot” on GitHub. GitHub is a popular site for sharing computer code. This time, though, it appears the code in question was not the…

February 20, 2018 • 3 min read
The Checklist 76: Apple Watch and Security

The Checklist 76: Apple Watch and Security

Way back in 2007, Apple released the iPhone and changed the world overnight by putting the power of an iPod, a phone, and the Internet right in our pockets. The iPhone quickly relegated the iPod to the annals of history, and for better or worse, it all but killed the wristwatch too. Then Apple decided it was time to bring the watch back to life — and thus, the Apple Watch was born.

February 15, 2018 • 13 min read
Popular MacUpdate Website Hacked to Distribute Crypto Miner

Popular MacUpdate Website Hacked to Distribute Crypto Miner

Keeping the software on your Mac up to date is essential, particularly because it can help to keep you safe from new threats and vulnerabilities. We’ve seen the emergence of a new type of malware that’s hitting Mac users through a service used to streamline…

February 12, 2018 • 3 min read
The Checklist 75: Mix and Match

The Checklist 75: Mix and Match

Spectres, Meltdowns, and an endless parade of patches — 2018’s already off to quite a start, and it can all be just a little overwhelming. This week, we’re pulling back to the bigger picture and reaching into the grab bag for a Mix & Match episode as we cover a slew of stories from this past month!

February 8, 2018 • 20 min read
Apple Pushes Range of Updates for Quality of Life and Security

Apple Pushes Range of Updates for Quality of Life and Security

Alongside Apple’s recent updates to macOS Sierra and OS X El Capitan to address the Spectre and Meltdown vulnerabilities, the final week of January also saw the release of a variety of other incremental updates for most of Apple’s products. Typically, Apple does not disclose…

February 2, 2018 • 2 min read
The Checklist 74: Overall iOS Security Features

The Checklist 74: Overall iOS Security Features

Your iPhone is secure, right? That’s the general impression, anyway — and it’s certainly an impression Apple has worked hard to maintain over the years. It’s easy enough to call it secure, but what is in place to keep you safe? What does Apple do to protect its users day after day, and do we ever need to go beyond the “out of box” security experience? On today’s edition of The Checklist, we’re talking about the overall security features you’ll find in iOS, whether you’re an iPhone or an iPad user

February 1, 2018 • 17 min read
Checklist 73: Meltdown, Spectre and You!

Checklist 73: Meltdown, Spectre and You!

On today’s edition of The Checklist, we’re tackling the complex topics of Spectre and Meltdown, arguably two of the biggest and most far-reaching security vulnerabilities we’ve ever seen. Among those impacted are everyone from iOS and macOS users to Windows machines and just about anything powered by an Intel processor around the world!

January 25, 2018 • 16 min read