Checklist 151: Too Close for Security Comfort

Checklist 151: Too Close for Security Comfort

This week on the Checklist podcast, we’ll talk about how to deal with security risks that come from those closest to you (literally). We’ll take you through some bad iOS news from the past week, and also discuss how it relates to a larger issue related to mobile security. And finally, we revisit a familiar topic—passwords—and tell you about some newly released Google research that probably means we’ll have to keep talking about passwords for the foreseeable future. Here’s our weekly Checklist:

Protecting your data from the people – literally – …

August 22, 2019 • 12 min read
Careers In Cybersecurity

Careers In Cybersecurity

In the first part of this two-part series, we made the case for cybersecurity as a career path with excellent short and long-term growth prospects.

But what, exactly, do folks who work in cybersecurity do all day?

That’s what we’ll cover in this article. 

While the list of jobs won’t be exhaustive—cybersecurity, like any complex and growing field, has a wide array of opportunities—it will cover some of the most in-demand specializations and give a representative sampling of the kinds of jobs out there (along with a general idea of how much they …

August 19, 2019 • 4 min read
Checklist 150: Trust Issues

Checklist 150: Trust Issues

On this edition of The Checklist: The Siri Sessions, O.MG: A Cable Hack, and 15 Apps to Watch for on Kids’ Phones.

August 15, 2019 • 9 min read
Should you post pictures of your kids on social media?

Should you post pictures of your kids on social media?

Parents are proud of their kids, and it’s natural to want to share special moments from their lives with friends and family on social media. But a growing chorus of experts is warning that sharing too much of our children’s private lives can do real harm.

What you decide to put on social media is a personal decision…but it should be an informed decision. Here are five things to consider before posting those baby bathtime photos—along with some tips to protect your children’s privacy and help keep them safe.

article span.backnum { …

August 14, 2019 • 5 min read
Sign in with Apple: Digital privacy at last?

Sign in with Apple: Digital privacy at last?

At this year’s Worldwide Developers Conference, Apple announced several forthcoming changes aimed at improving privacy and security for its users. Perhaps the most important of these was “Sign in with Apple”, slated for widespread release later this year.

In this post, we’ll talk about what Sign in with Apple is, why it matters…and whether or not it’s all it’s cracked up to be.

What is Sign in with Apple?

Many apps ask users to sign-in with a social media account, ostensibly in order to offer a more personalized experience. You’ve probably seen or …

August 14, 2019 • 4 min read
Are Cybersecurity Skills In Demand?

Are Cybersecurity Skills In Demand?

As millions of students head back to university this fall, a substantial chunk of them will do so without knowing what they’re actually going to end up studying.

For most undeclared majors, the final decision is going to come down to career prospects: whether or not they’ll be able to find a job after graduation.

Of course, nobody knows exactly what the economy is going to be doing (or not doing) in four years, but the best hedge against uncertainty has always been to figure out what skills are in demand—and learn …

August 12, 2019 • 3 min read
Black Hat 2019: Apple’s $1 million prize, new vulnerabilities revealed, and a keynote to remember

Black Hat 2019: Apple’s $1 million prize, new vulnerabilities revealed, and a keynote to remember

The 22nd annual Black Hat USA conference was held this week in Las Vegas. Black Hat is one of the most important events in cybersecurity, bringing together researchers, developers, and hackers from all over the world for a week of training sessions and briefings. As such, it’s often the stage for major announcements affecting security professionals as well as the general public.

This year’s Black Hat did not disappoint, and featured significant new developments that will interest both macOS and iOS users.

Read on for our roundup of Black Hat 2019…

The macOS …

August 9, 2019 • 4 min read
Checklist 149: Security Tripping with The Checklist

Checklist 149: Security Tripping with The Checklist

This week, we say hello to August with a groan as news of more big data breaches that could affect our financial lives comes out. Then we’ll pivot to talk about how you can stay safe when you squeeze in one last summer vacation before autumn arrives, and we’ll round things out with a follow-up to a follow-up. It’s in the name of the show — so here’s this week’s checklist of stories:

The Bad/Worse Breach7 Tips for TripsA Stronger Little Snitch

Let’s not waste any time as we embark on a …

August 8, 2019 • 10 min read
The DataSpii Privacy Disaster: How Browser Extensions Resulted in a Huge Sensitive Data Leak

The DataSpii Privacy Disaster: How Browser Extensions Resulted in a Huge Sensitive Data Leak

If you use Google Chrome or Mozilla Firefox as your go-to web browser, and you regularly make use of browser extensions, then some of your browsing data may have been compromised. According to a detailed Ars Technica report on the matter—which is being referred to as “DataSpii’—more than four million users have likely been affected. 

The fault lies with eight different browser extensions, meant for everything from getting past paywalls to zooming in on web content. The way these extensions were set up allowed them to access and collect a wide …

August 3, 2019 • 3 min read
Flaw in Bluetooth Protocols Could Allow Tracking of iPhone, MacBook Users

Flaw in Bluetooth Protocols Could Allow Tracking of iPhone, MacBook Users

Bluetooth is one of the most common wireless protocols in the world, allowing a vast range of devices to connect together for shared functionality. From playing music in your car to controlling the temperature of your flatiron, Bluetooth enables us to do many things — and as a result, Bluetooth protocols are standard on iPhones, in MacBooks, and in many other products, too. According to a new study published by researchers from Boston University, though, almost all those devices currently contain a Bluetooth flaw that can erase a user’s privacy.

Bluetooth’s …

August 2, 2019 • 3 min read
Digital Privacy and Relationships

Digital Privacy and Relationships

From sneaking a peek at a partner’s texts to logging into their Facebook account while they’re sleeping, people will go to surprising lengths to see what their significant others are doing online.

August 1, 2019 • 4 min read