SecurityOn March 7th, WikiLeaks entered the news and made waves again by releasing almost nine thousand documents they claimed came from within the US Central Intelligence Agency. Contained in the leak was a vast range of information about the CIA’s intelligence gathering practices regarding technology. The revelations included information that the agency had undertaken spying efforts through exploiting vulnerabilities in various technologies, including some “smart” TVs and mobile operating systems. Also, contained within the documents, however, were fourteen previously undisclosed flaws in iOS. Through these flaws, an attacker could …
March 21, 2017 •
2 min read
SecurityLas Vegas, Nevada, 20 March 2017 — SecureMac has announced the release of PrivacyScan 1.9.2, the latest version of its award-winning software designed to protect user privacy. The incremental update provides a more refined user experience while also addressing minor bugs. PrivacyScan 1.9.2 adds support to clean additional Firefox and Safari data locations, ensuring removal of personal information left behind after browsing the web. Meanwhile, users can enjoy interface refinements and ease-of-use improvements for even easier operation.
What PrivacyScan does for users
PrivacyScan plays a dual role: freeing up valuable disk …
March 20, 2017 •
2 min read
SecurityIf there is one type of software a user should have the ability to trust, it’s legitimate antivirus programs. As a tool designed to protect from malware attacks, every antivirus effort requires careful, thoughtful design and an absolute focus on the safety and security of the end user’s system. Unfortunately, that is not always the case. In one of the most egregious examples of a major flaw in an antivirus product for Macs, Google disclosed a vulnerability in ESET Endpoint Antivirus. Through this wide-open security hole, hackers could have …
March 18, 2017 •
3 min read
SecurityWhen you know where malware is most likely to be found and how it’s most likely to attack, you can take steps to avoid it. From email attachments to hacked websites, malware lurks in a number of places. On today’s episode, we’ll look at how malware is distributed: the means, the methods, and the most effective ways to mitigate the risks.
March 16, 2017 •
11 min read
SecurityInternet-Enabled Children’s Toys Expose Data for Hundreds of Thousands of Users
Have you heard of the “Internet of Things”? A relatively newer term, this phrase refers to far more than just Internet-connected thermostats and Wi-Fi-enabled refrigerators. Companies now build network functionality even into children’s toys. As we know from the problems caused by the Mirai malware & botnet, many Internet of Things (IoT) devices feature serious security flaws. Recently, the intersection of toys with these security flaws resulted in the exposure of a staggering amount of user information.
March 10, 2017 •
3 min read
SecurityWhen you suspect your Mac is infected, it’s important to take steps to find and fix the problem before the issue becomes severe — or worse, before your personal information is stolen. On today’s episode, we’ll look at the process you should follow if you think your Mac is suffering from a malware infection.
March 9, 2017 •
9 min read
SecurityThe last few months of 2016 were kind of quiet in terms of sightings of new Mac malware, but maybe that was just the calm before the storm. 2017 has already seen a plethora of newly discovered malware targeting the Mac. On today’s Checklist we’re covering five recent Mac malware threats and a bonus item: How to minimize those threats.
March 2, 2017 •
12 min read
SecuritySince last year’s emergence of KeRanger, the first functional ransomware for macOS, it seemed only a matter of time before more threats of that type appeared. Security researchers recently found the newest attempt at ransomware for the Mac out in the wild. Masquerading as a “cracker” to bypass copy protection on software e.g. Microsoft Office for Mac or Adobe Premiere, the attackers have simply uploaded the disguised payload to several torrent sites. The researchers noted that though they only encountered two variants, more may still exist or be released.
March 1, 2017 •
3 min read
SecurityThe internet is an important fixture in our lives, but definitely comes with some potential paths to hazards and threats, especially for kids. So what can you do to keep your kids safe? If you’re using a Mac – or if your child is, Apple includes a lot of tools in macOS that can help out. Today on The Checklist, we’ll look at five of the most important things to know about built-in parental controls on your Mac and how to use them effectively.
February 23, 2017 •
8 min read
SecurityA brand-new type of malware affecting Macs is in the wild, and this time there are definite signs of development in conjunction with a foreign nation. Designed (albeit rather poorly) to look like a Flash update, this malware, dubbed MacDownloader, is a unsophisticaed attempt to glean user passwords. Uncovered by security researchers after the malware targeted major defense contractors, the program may feature amateurish code, but its threat is very real.
After fooling a user into downloading the false Flash update, the malware quickly goes to work profiling the …
February 17, 2017 •
2 min read
SecurityJust about everyone has a smartphone these days, and many parents see the benefits in providing their children with a phone to keep in touch, or in case of an emergency. Smartphone also make it easier for children to be exposed to cyberbullying or inappropriate content, so how do you keep a child safe on the phone? We’re going to explore this topic more in depth on today’s episode!
February 16, 2017 •
9 min read
SecurityHow often do you check the permissions you grant to apps installed on your iPhone? Do you ever enter sensitive information into apps, like emails, passwords, and more? With apps of every type and nature available on smartphones, it’s all too easy to supply these apps with critical data without a second thought. However, a recent find by a security firm CEO reveals that there are a substantial number of apps with a fundamental flaw that could expose this private information to an attacker. How does it work?
The …
February 16, 2017 •
3 min read
SecurityRegularly clearing the history of sites one has visited in a browser is a common habit for many users. It reduces digital clutter while also providing you with a degree of control over your privacy on the web. When you’ve cleared your history, no one can access your device and instantly see where you’ve been online. That’s the idea, at least; unfortunately, an issue within iCloud meant that user histories lingered in the cloud, sometimes including data over a year old. Though wiped from the devices, a well-informed individual …
February 14, 2017 •
2 min read
SecurityAs a cultural phenomenon, emojis seem to be the natural evolution from more “old school” style emoticons. No longer just a small set of pictograms, emojis now compromise several hundred tiny digital images. Users pepper their text messages with them and fill up social media posts with emojis. The iPhone, like many other smartphones, includes its own built-in library of standard emojis. However, a recently uncovered flaw in the way some versions of iOS render a particular emoji can cause instability and inaccessibility for some iPads and iPhones.
What …
February 9, 2017 •
2 min read
SecurityThe files on your Mac are more than “just data” — they’re your music, your vacation pics, that report that’s due for work or the video of your child’s first steps. On today’s episode, we’re going to cover specific steps you can take to keep your data safe and secure from prying eyes.
February 9, 2017 •
11 min read
SecurityBeyond social media and online shopping sites, there’s a whole lot to the Internet that the average user simply can’t see. We’re talking, of course, about the so-called “dark web” which is only accessible with the Tor Browser. On today’s episode, we’ll be discussing this hidden side of the internet, and the special browser needed to access it.
February 2, 2017 •
10 min read
SecurityThe latest item of Mac malware to be uncovered is actually not new at all; in fact, it may have been around for several years. Dubbed “Fruitfly” by Apple, this malware has some novel features. In particular, its function depends upon using both an outdated library from the late 90s, libjpeg, as well as pre-OS X system calls. Why the malware was designed to use outdated methods is unknown, but in the wake of the malware’s discovery, Apple promptly issued an update to XProtect to reduce the threat to users. …
January 31, 2017 •
2 min read
SecurityOn today’s episode of the Checklist podcast, we’ll run down some of the security apps which are “must-haves” for any user. We’ll cover what these apps do, what sets them apart, and why you’d be wise to have some of them installed on your Mac.
January 26, 2017 •
9 min read
SecurityFor many users, Skype is often used to stay in touch with both friends and family as well as for business communications. Those who rely on Skype for Mac should be aware there was a recent discovery of a vulnerability in the application. Affecting Skype versions as recent as 7.35 (and all previous versions), the flaw could potentially expose user information or allow malware to interact with Skype.
The issue concerns the way Skype handles data interaction. Researchers uncovered the ability to bypass authentication requirements while while interacting with …
January 23, 2017 •
2 min read