SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Nicholas Raba, Nicholas Ptacek, and Ken Ray hit security topics for your Mac and iOS devices. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Episode: Steps to take when you suspect a malware infection

Steps to take when you suspect a malware infection

When you suspect your Mac is infected, it’s important to take steps to find and fix the problem before the issue becomes severe — or worse, before your personal information is stolen. On today’s episode, we’ll look at the process you should follow if you think your Mac is suffering from a malware infection.

Read Listen
Episode: Recent Upswing in Mac Malware Activity

Recent Upswing in Mac Malware Activity

The last few months of 2016 were kind of quiet in terms of sightings of new Mac malware, but maybe that was just the calm before the storm. 2017 has already seen a plethora of newly discovered malware targeting the Mac. On today’s Checklist we’re covering five recent Mac malware threats and a bonus item: How to minimize those threats.

Read Listen
Episode: 5 Things to Know About Child-Proofing Your Mac

5 Things to Know About Child-Proofing Your Mac

The internet is an important fixture in our lives, but definitely comes with some potential paths to hazards and threats, especially for kids. So what can you do to keep your kids safe? If you’re using a Mac – or if your child is, Apple includes a lot of tools in macOS that can help out. Today on The Checklist, we’ll look at five of the most important things to know about built-in parental controls on your Mac and how to use them effectively.

Read Listen
Episode: 5 Things to Know About Child-Proofing Your Kid’s iPhone

5 Things to Know About Child-Proofing Your Kid’s iPhone

Just about everyone has a smartphone these days, and many parents see the benefits in providing their children with a phone to keep in touch, or in case of an emergency. Smartphone also make it easier for children to be exposed to cyberbullying or inappropriate content, so how do you keep a child safe on the phone? We’re going to explore this topic more in depth on today’s episode!

Read Listen
Episode: Safeguarding Your Data with Backups and Encryption

Safeguarding Your Data with Backups and Encryption

The files on your Mac are more than “just data” — they’re your music, your vacation pics, that report that’s due for work or the video of your child’s first steps. On today’s episode, we’re going to cover specific steps you can take to keep your data safe and secure from prying eyes.

Read Listen
Episode: Tor and the Dark Web

Tor and the Dark Web

Beyond social media and online shopping sites, there’s a whole lot to the Internet that the average user simply can’t see. We’re talking, of course, about the so-called “dark web” which is only accessible with the Tor Browser. On today’s episode, we’ll be discussing this hidden side of the internet, and the special browser needed to access it.

Read Listen
Episode: Must-Have Third Party Security Apps for Any Mac User

Must-Have Third Party Security Apps for Any Mac User

On today’s episode of the Checklist podcast, we’ll run down some of the security apps which are “must-haves” for any user. We’ll cover what these apps do, what sets them apart, and why you’d be wise to have some of them installed on your Mac.

Read Listen
Episode: 5 Things to Know About Physical Security

5 Things to Know About Physical Security

On this podcast we frequently talk about the various “digital” defenses that you can set up to protect your Mac and iOS devices. Physically securing your devices is equally important, especially when it comes to protecting your data from prying eyes and grabbing hands in the “real world!” In today’s edition, we’ll cover what you need to know about physical security and some things you can do to improve your device’s safety.

Read Listen
Episode: All About VPNs

All About VPNs

VPNs (Virtual Private Networks) are one way you can take matters into your own hands and improve your privacy online. On today’s show, we’ll go over exactly what these are plus how you can use them on your Apple devices.

Read Listen
Episode: 2016 iOS Security Year In Review

2016 iOS Security Year In Review

Last week we took a look back at the defining moments in 2016 for Mac security, and this week we’re giving iOS the same treatment! A lot has happened in the past year, and we’ve got plenty to cover in this episode!

Read Listen

2016 Mac Security Year In Review

The past year has seen threats new and old targeting Mac users, but it has also seen some significant progress from Apple when it comes to security. On today’s episode, we’ll be covering some of the top Mac security stories that you might have missed over the past year.

Read Listen
Episode: 5 Ways Websites Are Tracking You

5 Ways Websites Are Tracking You

There are many different ways that websites and advertisers can track your online browsing habits. In today’s episode, we’re covering 5 ways websites are tracking you, why they’re doing it, and what it means for online privacy.

Read Listen
Episode: 4 Things to Know About the Muni Hack

4 Things to Know About the Muni Hack

It seems like new malware attacks are in the news just about every week. A recent ransomware attack crippled San Francisco’s public transit system, with far-reaching consequences. In today’s episode, we’re going to cover four important things you should know about the Muni hack.

Read Listen
Episode: 5 Ways to Secure Your Browser

5 Ways to Secure Your Browser

It’s no secret that web browsers rank among the most popular software for daily use, but this popularity also makes browsers an appealing target for viruses, malware, and hackers. In today’s episode, we’re going to tackle this issue with 5 ways to ensure a safe and secure Internet browsing experience.

Read Listen
Episode: Q&A Grab Bag

Q&A Grab Bag

On this week’s episode, we’re going to do something a bit different, and rather than focusing on one topic, we’ll be answering some listener questions on-air! Please feel free to shoot us an e-mail if you ever have a question about a topic we’ve covered, have a specific topic you’d like us to cover in the future, or need some advice when it comes to the security of your devices — we love hearing from our listeners!

Read Listen
Episode: Five Tips for Secure Holiday Shopping

Five Tips for Secure Holiday Shopping

It’s estimated that 120 million people shopped online on Cyber Monday in 2015, and that number is sure to be even higher this year! That’s a lot of gift shopping — and a lot of opportunities for something to go wrong. While shopping online is convenient, it also carries some security risks. On today’s Checklist: Five things you can do to make your online shopping more secure.

Read Listen
Episode: Traveling Safely with Your Mac and iOS Devices

Traveling Safely with Your Mac and iOS Devices

Today’s topic: travel. Millions of people travel substantial distances every day, whether it’s for business or pleasure. For the safety of your devices and the security of your data, there are a few things you’ll want to do. Today we’ll look at several ways you can prepare and keep yourself safe on your trip.

Read Listen
Episode: Demystifying Malware Types and Terminology (Part 2)

Demystifying Malware Types and Terminology (Part 2)

With malware attacks on the rise, more and more news coverage is devoted to analyzing these threats. On today’s show we’re going to help you make sense of all that security gibberish by demystifying the terminology and acronyms frequently encountered when it comes to malware.

Read Listen
Episode: Demystifying Malware Types and Terminology (Part 1)

Demystifying Malware Types and Terminology (Part 1)

On today’s show we’re going to cover what makes a piece of spyware different from a worm, and what makes a keylogger different from adware. Once you can tell the difference between the different types of malware, you’ll be better prepared to understand just how the different types of threats can affect *you*, and which ones are worth losing sleep over!

Read Listen
Episode: Best Practices for Login and Password Security

Best Practices for Login and Password Security

On today’s episode, we’re hitting best practices when it comes to login and password security — simple steps you can take to keep your accounts from falling into the wrong hands, and what to do in the event that your password has been compromised.

Read Listen
1 2 3 4

Join our mailing list for the latest security news and deals