SecurityWe are only halfway through Spring 2017 here in the states, and yet the season has already seen a lot of news-making malware. On today’s Checklist, we’ll break down the latest developments and cover what you need to know — and, where possible, how you can protect yourself.
May 11, 2017 •
19 min read
SecurityThis week we’re talking to you: Part II! It’s been awhile since our last Q&A episode, but the questions haven’t stopped coming in… and on today’s show we’ll answering questions sent in by listeners like you.
May 4, 2017 •
13 min read
SecurityOur phones today are home to dozens of apps providing both entertainment and utility. Each of these apps requests permissions from the system to access certain types of data. Apple makes it easy to see what apps use which permissions through the settings page on…
May 1, 2017 •
2 min read
SecurityDid you know that your Mac has a powerful suite of built-in sharing tools? Some of them are pretty straightforward, but others could used a bit more explanation. On today’s episode, we’ll cover the macOS Sharing Preferences: what you can do with them, and the potential impact they can have on your Mac’s security.
April 27, 2017 •
15 min read
SecurityWhat happens if you forget the password for your Mac? The good news is, your data is safe… the bad news is… you can’t have it. Luckily, there’s a lot you can do to try to get back into your Mac if you’ve forgotten your password. We’ll look at some of those on today’s Checklist.
April 20, 2017 •
10 min read
SecurityWith the huge volume of ads displayed on sites across the Web today, it’s no surprise that bad actors view them as a window to reach vulnerable users. A new malvertising threat has appeared for iOS users. This time, it’s not about infecting your iOS…
April 17, 2017 •
3 min read
SecurityMost people already have shadow profiles on social media platforms, and they didn’t even set them up… because that’s not how they work. On today’s show, we’ll take a closer look at what Shadow profiles are, how they’re used, and the potential privacy concerns they raise.
April 13, 2017 •
12 min read
SecurityAt the end of March, Apple released iOS 10.3 for users of the iPhone, iPad, and iPad Touch. The update was sizable, bringing multiple new features to iOS devices. However, just a week after iOS 10.3 arrived, Apple pushed out iOS 10.3.1. The latest update…
April 7, 2017 •
3 min read
SecuritySpring is here, and you know what that means… It’s time for some spring cleaning! Over time and with continuous use, your hard drive can end up just as messy and disorganized as a lived-in home after a long winter. On today’s episode we’ll cover steps you can take to clean up and organize your Mac!
April 6, 2017 •
12 min read
SecurityLas Vegas, Nevada, April 6, 2017 — Spring is here, and that means spring cleaning for many. To aid users in controlling their digital footprint and managing disk space, SecureMac has announced its newest update to PrivacyScan with version 1.9.3. This update to the award-winning application,…
April 6, 2017 •
3 min read
SecurityWhen Apple revealed its long-awaited refresh of the MacBook line last year, the Touch Bar was touted as a major selling point. By incorporating the same sensor technology already present in the iPhone, Apple said that a wide variety of new applications were available. From…
March 30, 2017 •
2 min read
SecurityAs helpful as the convenience of storing data in “the Cloud” can be, there are lots of examples of problems with cloud services causing disruption for individuals and for businesses. What happens when “the Cloud” goes bad? That’s our topic for this edition of The Checklist. We’ll look at problems you might encounter when using iCloud, as well as some of the broader issues with cloud computing in general.
March 30, 2017 •
10 min read
SecurityNo one likes to contend with pop-up windows, no matter what the context. Once a mainstay of advertising on the web, pop-ups today mostly remain only on less refined websites. Many users also associate pop-up windows with malware infection — and that isn’t a wrong…
March 23, 2017 •
2 min read
SecurityEncryption is big news today for security professionals and regular users as well. As more and more people are concerning themselves with keeping their communication secret, a large number of encrypted messaging apps are hitting the scene. How do you pick one? And what do you need to know about them?
March 23, 2017 •
11 min read
SecurityThough many of its now-famous hidden marketplaces have been taken down by law enforcement, the darknet continues to be a home for the web’s seediest characters. The latest item to hit the market and generate buzz isn’t an illegal substance — instead, it’s illegal software….
March 22, 2017 •
2 min read
SecurityOn March 7th, WikiLeaks entered the news and made waves again by releasing almost nine thousand documents they claimed came from within the US Central Intelligence Agency. Contained in the leak was a vast range of information about the CIA’s intelligence gathering practices regarding technology….
March 21, 2017 •
2 min read
SecurityLas Vegas, Nevada, 20 March 2017 — SecureMac has announced the release of PrivacyScan 1.9.2, the latest version of its award-winning software designed to protect user privacy. The incremental update provides a more refined user experience while also addressing minor bugs. PrivacyScan 1.9.2 adds support to…
March 20, 2017 •
2 min read
SecurityIf there is one type of software a user should have the ability to trust, it’s legitimate antivirus programs. As a tool designed to protect from malware attacks, every antivirus effort requires careful, thoughtful design and an absolute focus on the safety and security of…
March 18, 2017 •
3 min read
SecurityWhen you know where malware is most likely to be found and how it’s most likely to attack, you can take steps to avoid it. From email attachments to hacked websites, malware lurks in a number of places. On today’s episode, we’ll look at how malware is distributed: the means, the methods, and the most effective ways to mitigate the risks.
March 16, 2017 •
11 min read
SecurityInternet-Enabled Children’s Toys Expose Data for Hundreds of Thousands of Users Have you heard of the “Internet of Things”? A relatively newer term, this phrase refers to far more than just Internet-connected thermostats and Wi-Fi-enabled refrigerators. Companies now build network functionality even into children’s toys….
March 10, 2017 •
3 min read