SecurityChecklist 428: Avoiding SMS for 2FA and a Plot Twist for 23andMe
23andMe changes hands, SMS 2FA risks exposed—why your data & online security need smarter tools now.
June 23, 2025 • 4 min read •
Security23andMe changes hands, SMS 2FA risks exposed—why your data & online security need smarter tools now.
June 23, 2025 • 4 min read •
Learn how to protect your online accounts by enabling Two-Factor Authentication. By requiring a password and a unique code, 2FA adds an extra layer of security, reducing the risk of unauthorized access.

We mention two-factor authentication quite a bit, but it’s been a while since we took a close look. On this week’s Checklist by SecureMac: Different types of authentication, What kinds of accounts should employ it, and August tells a 2FA tale.

A recent rash of ransomware attacks has left some Apple users locked out of their Mac computers and iOS devices. The nature of the attacks led some users to wonder if Apple itself had suffered some kind of hack. The good news is that the…

published: September 09, 2000 vulnerable: Intego’s NetBarrier (all versions) running on MaCOS Discussion Intego software (www.intego.com) offers a security software package for the Macintosh platform. The software is a firewall utility that allows the user to chose between different security schemes (server only, client only,…
September 9, 2000 • 4 min read
Information SuperLock is the premier shareware Macintosh security utility. It has been protecting Macs from casual snoopers since 1993, and it protected Macs for two years before that as a program called MacLauncher (which still works properly on the latest Macs!). It can be found…
May 2, 2001 • 2 min read
Security Bulletin Issued by Microsoft May 21, 2001 The following is the list of vulnerable products: Microsoft Word 98 for the Mac Microsoft Word 2001 for the Mac Summary When Microsoft Word opens a RTF (Rich Text Format) file that contains a…
May 21, 2001 • 2 min read
Information DoorStop, from Open Door Networks, Inc., is a software-based “firewall” product for Macintosh servers. DoorStop is software that you install directly on the servers which you wish to protect. DoorStop is significantly easier to set up and use than a hardware firewall and provides…
June 2, 2001 • 2 min read
What is OpenSSH OpenSSH is a cost free version of the SSH protocol suite. Many of the users who utilize telnet, ftp, rlogin and other programs may not realize that their passwords are transmitted in plain text (unencrypted) across the Internet. The OpenSSH suite encrypts…
June 2, 2001 • 2 min read
Information IPNetSentry is a simple and intelligent security application which protects your Macintosh from outside Internet intruders. This is particularly important for Macintosh users who have cable modem, DSL, or another high-speed Internet service where connections can be maintained and left unattended for hours (or…
June 2, 2001 • 3 min read
Information ContentBarrier offers content control, web filters, parental control and much more. ContentBarrier is made by Intego, the creators of the MacOS firewall NetBarrier. This software is primarily used for two targeted audiences, the parent who want to restrict young children from accessing the uncensored…
June 2, 2001 • 4 min read
Information Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth…
June 2, 2001 • 3 min read
What is SSH Admin? Secure Shell Admin allows you to easily configure and use the Secure Shell Daemon. With Secure Shell Admin you have are setup easily with the 3 Step setup wizard. From there you may configure the server options and access lists. You…
June 2, 2001 • 1 min read
Information PGP Personal Security – 7.0.3 for Macintosh w/RSA – $19.95 USD – Strong, secure, protection for your hard disk, data, and email.. Available in: US or Canada only Views Excellent program, for those who remember 6.0.2 was free for a limited time. The current…
June 2, 2001 • 1 min read
Information Privacy means that only the intended recipient of a message can read it. By providing the ability to encrypt messages, PGP provides protection against anyone eavesdropping on the network. Even if the information is intercepted, it is completely unreadable to the snooper. Authentication identifies…
June 2, 2001 • 4 min read
Information PowerCrypt implements the major cryptographic methods, standards and hash algorithms: DES, IDEA, RSA, DSA, PKCS, MD2, MD5. As well, PowerCrypt implements the major secure e-mail protocols: PEM, S/MIME. PowerCrypt handles standard X 400 certificates: It stores received new certificates both as a local password…
June 2, 2001 • 1 min read