Results for

What You Need to Know about Email Spam

What You Need to Know about Email Spam

If you feel like you’ve been getting more email spam than usual lately, you’re probably right. According to a recent report from Fortune, a sophisticated spambot called “Onliner” has figured out a way to bypass spam filters and has used that advantage to target some…

September 20, 2017 • 3 min read
The Internet of Things: The Future of Tech or One Bridge Too Far?

The Internet of Things: The Future of Tech or One Bridge Too Far?

For years, tech enthusiasts have been calling the Internet of Things “the future of technology.” But is it? On the one hand, there is some appeal to a world where everything is digitally connected. Being able to control your home’s lights, thermostat, irrigation system, security…

September 19, 2017 • 3 min read
Checklist 54: The Equifax Hack

Checklist 54: The Equifax Hack

The personal information of 143-million people may have been compromised when the consumer credit reporting agency Equifax was hacked. What do we know about the attack? And what can we do going forward?

September 18, 2017 • 16 min read
Apple Adds New Touch ID Option in iOS 11

Apple Adds New Touch ID Option in iOS 11

Since the addition of the fingerprint reader to the iPhone, the convenience of Touch ID has been hard to deny. From unlocking our phones to instantly authorizing an in-app purchase, it’s a rapid and convenient way to authenticate yourself to your device. Now with iOS…

September 18, 2017 • 2 min read
Checklist 50: Hacking Your Health

Checklist 50: Hacking Your Health

On today’s episode, we’re looking at the way technological change has affected modern medicine, threats the healthcare industry faces, and what we can do to protect patient safety now and in the future.

August 17, 2017 • 18 min read
Apple Removes VPNs from Chinese App Store

Apple Removes VPNs from Chinese App Store

One of Apple’s most famous marketing campaigns revolved around the catchphrase “There’s an app for that”—to the point that Apple eventually had the slogan trademarked. However, for users living in China, that statement is no longer true. According to a recent report from CNBC, Apple…

August 14, 2017 • 3 min read
Securing Your Data with macOS and Keychain

Securing Your Data with macOS and Keychain

Every time a new version of Apple’s operating system arrives, every tech-focused publication on the Internet does a deep dive on the new key features. Occasionally, though, cool bells and whistles go overlooked. Such is the case with the macOS Keychain Access application, which, in…

August 11, 2017 • 3 min read
Checklist 49: Artificial Intelligence and Security

Checklist 49: Artificial Intelligence and Security

The rise of artificial intelligence in the consumer space seems to have happened overnight. It feels like we’ve gone from Apple’s introduction of Siri to virtual assistants everywhere in the blink of an eye. On today’s episode, we’ll be covering some security concerns that accompany the rise of AI.

August 10, 2017 • 16 min read
Google Makes Changes to Prevent Future Docs Phishing Attacks

Google Makes Changes to Prevent Future Docs Phishing Attacks

Earlier this year, Google users encountered a unique and particularly devious phishing attack. Phishers have used Google Docs in various capacities for several years, most frequently creating phony forms to try to collect sensitive user data. During this enormous wave of phishing attempts, though, users…

August 8, 2017 • 2 min read
Security Researchers Develop New Exploits Based on Leaked NSA Tools

Security Researchers Develop New Exploits Based on Leaked NSA Tools

While the WannaCry ransomware wave was sweeping the globe, one of the first stories that emerged alongside it was about the exploit that allowed it to exist: EternalBlue. Exposed as an NSA-discovered vulnerability during leaks by the mysterious Shadow Brokers, it allows malware authors to…

August 5, 2017 • 2 min read
Checklist 48: All About Spyware

Checklist 48: All About Spyware

On today’s episode we’ll be taking a look at spyware: what it does, where it comes from, and what you can do to defend against it. Sometimes it’s pretty obvious when you’ve got a malware infection – ransomware lets you know that your files have…

August 3, 2017 • 27 min read
The Age of iPhone Jailbreaking is Drawing to a Close

The Age of iPhone Jailbreaking is Drawing to a Close

Remember jailbreaking? From the first iPhone, it has been an integral part of the community around the device and even something which has pushed its development forward. Initially, just a way to unlock the phone and release it from the “jail” of an exclusive carrier…

August 3, 2017 • 3 min read