Results for

Checklist 39: 5 Ways to Work Towards New Security Skills

Checklist 39: 5 Ways to Work Towards New Security Skills

Ever wonder how to become a computer security expert? On this edition of The Checklist, we’re looking at ways that anyone with a drive for it can pick up computer security skills and start down the path to becoming a computer security professional.

June 1, 2017 • 19 min read
SecureMac Continues Pushing Mac Security Forward with Release of MacScan 3.1

SecureMac Continues Pushing Mac Security Forward with Release of MacScan 3.1

Las Vegas, Nevada — With malware making headlines nearly every week, users everywhere wonder how to keep their computers safe. Today, SecureMac released the latest version of its flagship security software, MacScan 3.1. Since its initial release over a year ago, MacScan 3 has led the way with user-friendly and intuitive anti-malware protection. Its original support for OS X 10.8 (Mountain Lion) through OS X 10.11 (El Capitan) has since been expanded to include the latest version of macOS 10.12 (Sierra). With last year’s emergence of the KeRanger ransomware …

May 30, 2017 • 4 min read
Compromised Download Server Infects Handbrake Users with Malware

Compromised Download Server Infects Handbrake Users with Malware

People with an extensive DVD or Blu-Ray collection can enjoy a wide variety of media at home, but what happens when you want to take it with you? The simple solution is to “rip” your favorite DVDs to create digital media files you can play back on your MacBook, or perhaps store on your home media server. Many Mac users dabble with this. Most people use the popular software, Handbrake, to digitize their media. Unfortunately, hackers recently compromised one of Handbrake’s download servers. For four days, an unknown quantity …

May 30, 2017 • 3 min read
Checklist 38: 5 Things to Know About WannaCrypt

Checklist 38: 5 Things to Know About WannaCrypt

The world saw one of the largest ransomware attacks conducted so far just a couple of weeks ago. The story has captured public attention for longer than most digital security stories, and for good reason. From its shadowy origins to its very visible effects, the ransomware known as ‘WannaCrypt’ or ‘WannaCry’ is the topic for today’s edition of The Checklist.

May 25, 2017 • 18 min read
Checklist 37: Gone Phishing

Checklist 37: Gone Phishing

There are bad guys out there who want to trick you into giving them your sensitive information. “Phishing,” as this practice of impersonation is known, is nothing new. With so much money flowing online and so much personal data available, more and more people are going phishing, which is the topic for today’s episode!

May 18, 2017 • 12 min read
Checklist 36:  Spring Malware Roundup

Checklist 36: Spring Malware Roundup

We are only halfway through Spring 2017 here in the states, and yet the season has already seen a lot of news-making malware. On today’s Checklist, we’ll break down the latest developments and cover what you need to know — and, where possible, how you can protect yourself.

May 11, 2017 • 19 min read
Checklist 35: Q&A Grab Bag Redux

Checklist 35: Q&A Grab Bag Redux

This week we’re talking to you: Part II! It’s been awhile since our last Q&A episode, but the questions haven’t stopped coming in… and on today’s show we’ll answering questions sent in by listeners like you.

May 4, 2017 • 13 min read
Uber Breaks Apple Rules by Fingerprinting iPhones After Deletion

Uber Breaks Apple Rules by Fingerprinting iPhones After Deletion

Our phones today are home to dozens of apps providing both entertainment and utility. Each of these apps requests permissions from the system to access certain types of data. Apple makes it easy to see what apps use which permissions through the settings page on all iOS devices. However, how can you be sure that apps are playing by the rules?

According to a recent report by the New York Times, Uber recently landed itself in more hot water when Apple uncovered efforts to circumvent the App Store’s Terms …

May 1, 2017 • 2 min read
Checklist 34: Sharing Preferences in macOS

Checklist 34: Sharing Preferences in macOS

Did you know that your Mac has a powerful suite of built-in sharing tools? Some of them are pretty straightforward, but others could used a bit more explanation. On today’s episode, we’ll cover the macOS Sharing Preferences: what you can do with them, and the potential impact they can have on your Mac’s security.

April 27, 2017 • 15 min read
Checklist 33: What to Do When You’ve Lost Your Mac’s Password

Checklist 33: What to Do When You’ve Lost Your Mac’s Password

What happens if you forget the password for your Mac? The good news is, your data is safe… the bad news is… you can’t have it. Luckily, there’s a lot you can do to try to get back into your Mac if you’ve forgotten your password. We’ll look at some of those on today’s Checklist.

April 20, 2017 • 10 min read
New Malvertising Campaign Targets iOS Users with Data-Hoarding VPN

New Malvertising Campaign Targets iOS Users with Data-Hoarding VPN

With the huge volume of ads displayed on sites across the Web today, it’s no surprise that bad actors view them as a window to reach vulnerable users. A new malvertising threat has appeared for iOS users. This time, it’s not about infecting your iOS devices directly — instead, it’s designed to coerce users into installing software that monitors and tracks their online activities. It does this by masquerading as a VPN, or virtual private network. VPNs are often useful for providing yourself with greater privacy protections while browsing …

April 17, 2017 • 3 min read
Checklist 32: Shadow Profiles on Social Media

Checklist 32: Shadow Profiles on Social Media

Most people already have shadow profiles on social media platforms, and they didn’t even set them up… because that’s not how they work. On today’s show, we’ll take a closer look at what Shadow profiles are, how they’re used, and the potential privacy concerns they raise.

April 13, 2017 • 12 min read
Apple Releases iOS Update to Patch Wi-Fi Vulnerability

Apple Releases iOS Update to Patch Wi-Fi Vulnerability

At the end of March, Apple released iOS 10.3 for users of the iPhone, iPad, and iPad Touch. The update was sizable, bringing multiple new features to iOS devices. However, just a week after iOS 10.3 arrived, Apple pushed out iOS 10.3.1. The latest update fixed a major Wi-Fi vulnerability that was apparently included in the original 10.3 update.

While the next big version update for the iOS platform—iOS 11—won’t arrive until the end of the summer or the beginning of the fall, iOS 10.3 was still seen as …

April 7, 2017 • 3 min read
Checklist 31: Spring Cleaning For Your Mac

Checklist 31: Spring Cleaning For Your Mac

Spring is here, and you know what that means… It’s time for some spring cleaning! Over time and with continuous use, your hard drive can end up just as messy and disorganized as a lived-in home after a long winter. On today’s episode we’ll cover steps you can take to clean up and organize your Mac!

April 6, 2017 • 12 min read
SecureMac Kicks Off Digital Spring Cleaning Season with PrivacyScan 1.9.3 Release

SecureMac Kicks Off Digital Spring Cleaning Season with PrivacyScan 1.9.3 Release

Las Vegas, Nevada, April 6, 2017 — Spring is here, and that means spring cleaning for many. To aid users in controlling their digital footprint and managing disk space, SecureMac has announced its newest update to PrivacyScan with version 1.9.3. This update to the award-winning application, designed to safeguard user privacy, delivers priority bug fixes along with several other improvements. User interface refinements yield simple and efficient operation easy for both beginners and advanced users. PrivacyScan 1.9.3 also provides enhanced cleaning for Google Chrome users, securely and efficiently removing private …

April 6, 2017 • 3 min read
Competing Hackers Discover Method for Hijacking the Touch Bar

Competing Hackers Discover Method for Hijacking the Touch Bar

When Apple revealed its long-awaited refresh of the MacBook line last year, the Touch Bar was touted as a major selling point. By incorporating the same sensor technology already present in the iPhone, Apple said that a wide variety of new applications were available. From rapid online purchasing to using your fingerprint to unlock your Mac, it attracted plenty of attention. Apple even discussed its efforts to secure the Touch Bar, since protecting user biometric information and payment data is of obvious importance.

However, a recent hack of …

March 30, 2017 • 2 min read
Checklist 30: What Happens When “The Cloud” Goes Bad

Checklist 30: What Happens When “The Cloud” Goes Bad

As helpful as the convenience of storing data in “the Cloud” can be, there are lots of examples of problems with cloud services causing disruption for individuals and for businesses. What happens when “the Cloud” goes bad? That’s our topic for this edition of The Checklist. We’ll look at problems you might encounter when using iCloud, as well as some of the broader issues with cloud computing in general.

March 30, 2017 • 10 min read
Recent Google Issues Present Some Mac Users with Pop-Up Password Prompt

Recent Google Issues Present Some Mac Users with Pop-Up Password Prompt

No one likes to contend with pop-up windows, no matter what the context. Once a mainstay of advertising on the web, pop-ups today mostly remain only on less refined websites. Many users also associate pop-up windows with malware infection — and that isn’t a wrong association to have, either. Often, malware will present you with a dialogue box that resembles a genuine system prompt. However, it could then lead you into installing more malicious software or exposing your personal information. However, it’s not always a sign that something is …

March 23, 2017 • 2 min read
Checklist 29: Encrypted Chat Apps for Secure Messaging on iOS

Checklist 29: Encrypted Chat Apps for Secure Messaging on iOS

Encryption is big news today for security professionals and regular users as well. As more and more people are concerning themselves with keeping their communication secret, a large number of encrypted messaging apps are hitting the scene. How do you pick one? And what do you need to know about them?

March 23, 2017 • 11 min read
Allegedly “Undetectable” Malware Offered for Hefty Darknet Price Tag

Allegedly “Undetectable” Malware Offered for Hefty Darknet Price Tag

Though many of its now-famous hidden marketplaces have been taken down by law enforcement, the darknet continues to be a home for the web’s seediest characters. The latest item to hit the market and generate buzz isn’t an illegal substance — instead, it’s illegal software. Several outlets have reported that an anonymous darknet user is currently making attempts to sell an allegedly unreleased “remote administration tool,” or RAT, for Macs.

Dubbed “Proton,” when installed this software gives attackers full control over a user’s machine. That includes downloading more …

March 22, 2017 • 2 min read