
Search
Results for


MacSpy
July 11, 2017 • 1 min read
Checklist 44: A look at encryption, past and present.
Today’s episode is all about encryption. We’ll look at encryption across time – from ancient history, to encountering it today on the web.
July 6, 2017 • 18 min read
Malware from Compromised Handbrake Servers Leads to Stolen Source Code
Back at the end of May, we reported on a story about a malware threat to Mac users delivered via the popular DVD ripping software Handbrake. In that incident, hackers broke in to one of the download servers Handbrake used to serve installers to users….
July 3, 2017 • 2 min read
Apple Covers All the Bases with Over 100 Security Updates in May
In mid-May, while the world was waking up to deal with the chaos caused by the WannaCry ransomware spreading over the web, Apple was making its users safer again. Released on May 15th, a new set of patches dropped for iOS, macOS Sierra, and both…
June 29, 2017 • 2 min read
Checklist 43: 5 Things to Know About Spam
Today’s episode is all about spam! No, not the mystery meat, but rather those mountains of junk email that clog up your inbox and take up your time.
June 29, 2017 • 18 min read
Darkweb Hackers Begin Offering Functional Mac Malware and Ransomware as a Service
With the popularity of both ransomware and the creation of macOS malware on the rise with hackers, Apple users face a growing number of threats. It now appears that others have turned their attention to the creation of new malware to spy on Mac users…
June 29, 2017 • 3 min read
New Version of iOS Makes Quiet Changes to How Apps Use Your Location
At Apple’s annual WWDC event this year, the company made a host of big announcements. Chief among them was the unveiling of the next iteration of iOS, version 11. While they highlighted many of iOS 11’s new features during the conference, some other changes flew…
June 27, 2017 • 2 min read
Apple Adds New Password Rules to Secure iCloud Accounts
iCloud users will soon need to abide by a new set of password requirements, put in place by Apple to fight against account breaches. In mid-May, Apple sent out a support email to iCloud customers, explaining the new requirements. The new requirements went into effect…
June 26, 2017 • 2 min read
Apple Retains Notes Synced to iCloud after Deletion
Apple may be retaining deleted notes in iCloud without user knowledge or consent, according to a recent blog post from security software company Elcomsoft. If you use the Notes app on your Apple device and sync the notes to iCloud, there’s a chance that Apple…
June 23, 2017 • 3 min read
Checklist 42: The Internet of Things: New Devices, New Concerns
Today, Internet connectivity doesn’t just include computers and phones. It’s lights, cameras, thermostats, and more. It’s called the Internet of Things, and it’s the topic of today’s show! In this episode we’ll be taking a closer look at security concerns that come with all these new IoT devices.
June 22, 2017 • 17 min read
Checklist 41: Open Sesame: Authentication and Online Security
When it comes to online security, there are all sorts of ways to prove we are who we say we are. On this week’s Checklist, we’re talking authentication, authorization, and the difference between the two.
June 15, 2017 • 19 min read
Apple Reveals That Government Security Requests Are Becoming More Common
The government is getting more comfortable asking tech companies to hand over user data. At least, that’s the conclusion that you might draw after reading Apple’s recent “Report on Government and Private Party Requests for Customer Information” from the second half of 2016. According to…
June 13, 2017 • 3 min read
Checklist 40: Apple’s Hacker History
Ransomware, malware, DDoS attacks… Those are the kinds of things we tend to think of when someone says the work “hacker” today. That’s not what the word used to mean, though. We’re doing a bit of hacker history on today’s checklist, looking at Apple’s hacker roots and how that led to the ever growing Apple ecosystem.
June 8, 2017 • 16 min read
Siri Voice Command Bug Could Let Thieves Hide from Find My iPhone
The theft of smartphones is a large problem, especially with high-value items like iPhones. Whether a thief takes a phone to use or to resell, they’ll need to wipe the device first. Normally, the iPhone passcode and access control restrictions prevent that from happening. Meanwhile,…
June 6, 2017 • 2 min read
Checklist 39: 5 Ways to Work Towards New Security Skills
Ever wonder how to become a computer security expert? On this edition of The Checklist, we’re looking at ways that anyone with a drive for it can pick up computer security skills and start down the path to becoming a computer security professional.
June 1, 2017 • 19 min read
SecureMac Continues Pushing Mac Security Forward with Release of MacScan 3.1
Las Vegas, Nevada — With malware making headlines nearly every week, users everywhere wonder how to keep their computers safe. Today, SecureMac released the latest version of its flagship security software, MacScan 3.1. Since its initial release over a year ago, MacScan 3 has led…
May 30, 2017 • 4 min read
Compromised Download Server Infects Handbrake Users with Malware
People with an extensive DVD or Blu-Ray collection can enjoy a wide variety of media at home, but what happens when you want to take it with you? The simple solution is to “rip” your favorite DVDs to create digital media files you can play…
May 30, 2017 • 3 min read
Checklist 38: 5 Things to Know About WannaCrypt
The world saw one of the largest ransomware attacks conducted so far just a couple of weeks ago. The story has captured public attention for longer than most digital security stories, and for good reason. From its shadowy origins to its very visible effects, the ransomware known as ‘WannaCrypt’ or ‘WannaCry’ is the topic for today’s edition of The Checklist.
May 25, 2017 • 18 min read
Checklist 37: Gone Phishing
There are bad guys out there who want to trick you into giving them your sensitive information. “Phishing,” as this practice of impersonation is known, is nothing new. With so much money flowing online and so much personal data available, more and more people are going phishing, which is the topic for today’s episode!
May 18, 2017 • 12 min read