InterviewsGeorgia Weidman is a penetration tester, security researcher, writer, trainer, and entrepreneur.
She is the author of a highly-regarded book which teaches the fundamentals of penetration testing, Penetration Testing: A Hands-On Introduction to Hacking, and has taught security courses and conducted advanced training sessions at such prestigious venues as Black Hat, Tulane University, West Point, and the NSA.
Weidman is also the founder of Shevirah, a company focused on mobile device and Internet of Things (IoT) security, as well as Bulb Security, a cybersecurity …
December 17, 2019 •
13 min read
SecureMac Company Press ReleasesCybersecurity firm has changed with threat landscape; looks to future
December 17, 2019 •
3 min read
SecurityCupertino rolled out new features and bug fixes for all of its operating systems, so we’re going to take a look at last week’s security news broken down by OS.
December 12, 2019 •
8 min read
MalwareThe new malware sample bears similarities to the well-known AppleJeus malware, which targets cryptocurrency exchanges. AppleJeus is the product of Lazarus Group, a shadowy cybercrime organization believed by many to be linked to North Korea.
December 10, 2019 •
6 min read
SecurityOn this week’s Checklist, we’ll look at some dumb ways to buy a smartwatch. We’ll share a PSA from the FBI. And we’ll talk politics and app security by way of FaceApp.
December 6, 2019 •
13 min read
BlogSo you’re the proud owner of a brand new Mac — wonderful!
You’re no doubt eager to try out all the bells and whistles; install your favorite apps; start using your new machine. We know the feeling.
But part of setting up a new macOS device should always be making sure it’s secure — and that’s what we’re going to cover in this quick setup guide. Follow these “Day 1” steps so you can enjoy your Mac with confidence in the weeks, months, and years to come.
article span.backnum { font-family:”Open Sans”, sans-serif; …
December 3, 2019 •
10 min read
SecurityThis week’s Checklist gets you ready for the seasonal shopping rush (from a cybersecurity perspective, anyway). We’ll show you how to keep safe as you shop online; what gifts you might want to avoid; and how to make sure everything arrives as planned; and what to do when all the madness is over!
This week’s Checklist covers:
How to shopWhat (not) to buyDeliveries and checkups
Shop smart, shop safe
Before you actually purchase anything online, there are a couple of basic precautions you should take — and one or two seasonal threats you need …
November 29, 2019 •
11 min read
SecurityA a complete guide to how to keep yourself safe during the holiday travel season. We’ll tell you what to do before you even walk out the door, how to protect yourself while you’re traveling, and what things to bear in mind when you reach your destination.
November 21, 2019 •
12 min read
SecurityOn this edition of The Checklist: Apple Mail Encryption, Now with Less Encryption!, Ransomware Revisited, and A Ring of Insecurity.
November 14, 2019 •
10 min read
BlogPrivacy is hard to come by these days. Malicious actors, large corporations, and governments are constantly trying to look over your shoulder when you’re online.
But some in the tech community are fighting back. Tools like ad blockers, no-track browsers, and VPNs can help keep digital snoops in check.
One of the most important of these technologies is encrypted messaging, which is available through a number of third-party and native applications.
So how do these messengers work? Are they all the same? And the million dollar question: Are they truly secure? Here’s what …
November 13, 2019 •
8 min read
BlogPatrick Wardle is a security researcher and software developer whose areas of expertise include macOS malware and nation-state threats.
Wardle is Principal Security Researcher at Jamf and creator of the Objective-See suite of security tools. He is also the founder of the world’s premier Mac security conference: Objective by the Sea.
We caught up with Patrick to talk about macOS security as well as the advanced threats being created by nation-state actors around the world.
CNN once called Patrick Wardle “a sweet guy” who could “hack …
November 12, 2019 •
24 min read
BlogDigital forensic analysts are the Sherlocks of cybersecurity, gathering and interpreting evidence from digital sources for use in criminal or civil court cases. While the field of digital forensics is an interesting topic in its own right, it’s also worth learning about if you’re interested in digital privacy issues.
Understanding how digital forensic analysts work—and in particular, what they look for in their investigations—can teach you a lot about what’s going on behind the scenes on your computer. And once you know that, you can take steps to better protect your …
November 11, 2019 •
8 min read