SecuritySIM swapping is a serious cybersecurity threat — and it’s on the rise, affecting everyone from ordinary people to tech titans like Twitter CEO Jack Dorsey. In this short piece, we’ll explain what SIM swapping is, how it works, and how to protect yourself.
What is SIM swapping?
SIM swapping can be thought of as part social engineering scam, part identity theft. A SIM swap takes place when a bad actor convinces (or bribes) a cellular carrier to transfer a victim’s mobile number to a SIM card that they own.
How does SIM …
March 17, 2020 •
7 min read
SecurityThis Checklist is all about Covid-19, the severe new form of coronavirus which has recently reached pandemic status. We’ll cover several safety issues related to the virus — both digital and physical
March 12, 2020 •
7 min read
InterviewsSarah Edwards is a digital forensic analyst whose area of specialization is Mac and iOS forensics. She works as a Senior Digital Forensics Researcher for BlackBag Technologies, and is also a teacher, holding the position of Principal Instructor at the SANS Institute, where her pedagogical skills have garnered praise from students and colleagues alike. In addition, Edwards is the creator of an open-source tool for iOS and macOS forensics called APOLLO, which she will discuss at the upcoming Objective by the Sea 3.0 Mac security conference. We spoke …
March 11, 2020 •
16 min read
SecurityMac malware is largely made up of adware and Potentially Unwanted Programs (PUPs) — and these are often regarded as nuisances rather than true dangers.
March 10, 2020 •
7 min read
SecurityAs the Covid-19 virus continues to spread, more companies will consider remote work as a way to keep their teams healthy and safe. But for many businesses, this will be their first experiment with remote work at scale — and they may not be ready for the cybersecurity issues that it brings.
March 9, 2020 •
6 min read
SecurityChecklist 176 is all about privacy, security, and the little startup that may have stolen your face.
March 5, 2020 •
6 min read
SecurityWe’ll tell you everything you need to know in order to understand what stalkerware is and how to avoid it.
March 2, 2020 •
7 min read
InterviewsPhil Stokes is a malware researcher and technical writer for SentinelOne, an emerging powerhouse in the world of enterprise cybersecurity. He is also an independent app developer who has created several macOS troubleshooting tools. In March, he will present his research at the Objective by the Sea 3.0 macOS security conference. We spoke with Phil about the state of Mac malware today — and why Apple is going to need all the help it can get.
New research suggests that Mac malware is increasing exponentially — and even beginning …
March 2, 2020 •
16 min read
SecurityOn this week’s Checklist, we’ll talk about Apple’s moves to improve web security. We’ll look at what Google is doing to make downloads safer. And last but not least, we’ll give you a quick intro to data breach prevention.
February 27, 2020 •
8 min read
SecurityEarlier this month, security researchers at Malwarebytes released a bombshell report which claimed that Mac malware threats were outpacing Windows threats for the first time ever. The report analyzed data taken from a variety of sources, including telemetry from the actual Mac and Windows machines of home and enterprise users. The core findings were remarkable, to say the least: a 400% year-over-year increase in Mac-specific threats and an eyebrow-raising 2:1 threat to endpoint ratio when comparing macOS and Windows platforms.
In this short article, we’ll take a closer look at the …
February 21, 2020 •
6 min read
SecurityThis week on the Checklist, we’ll start off with a big list of tips to keep your iPhone safe and happy … and then we’ll take a new look at Google’s Nest smart home devices.
February 20, 2020 •
11 min read
SecurityWith the April 15 tax filing deadline just weeks away, millions of U.S. taxpayers are getting ready to electronically file their tax returns. But electronic data transfer carries risks…
February 19, 2020 •
4 min read