SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Checklist 106: Breaking Down Breakdowns in the Mac App Store

This week, we’re taking a bit of a different approach to our show. Instead of presenting you with a list of topics and running down several separate stories, this week we’re focusing in on one major story that’s developed over the last week or two: breaches within Apple’s walled garden, the App Store. If you’ve heard disturbing stories about apps stealing your data and sending it off to China, or rumors about a major tech company (Trend Micro) fumbling the ball and mishandling user data, chances are good you’ve …

Read Listen

Checklist 105: Products and Byproducts

In this week’s discussion, we’re looking at some stories that strike a similar tone to several of our recent episodes. With Google figuring out how to use your spending habits to make money, spyware apps that end up being compromised, and a look at the web’s privacy-friendly search engine, we’ve got plenty to tackle today. Here’s what we’ve got on our list:

You’re still the product
Your kids are the byproduct
A look at how things are going for DuckDuckGo

Have you ever heard the saying, “If you aren’t paying for a …

Read Listen

Checklist 104: Guess Again! And Again! And Again!

It might seem like we have a thousand new security issues to talk about each week — but if you’ve been listening for a while, you know that’s pretty much par for the course these days. This week we have a plethora of stories about telcos (and their partners) dropping the ball when it comes to user privacy, followed by yet another Facebook story that leaves us wondering “When is enough enough?” and wrapping up with a big problem where parental spyware proves once again that actions can have …

Read Listen

Checklist 103 Always Look a Gift Horse in the Mouth

Last week, we spent most of our discussion shaking our heads. This week, we’ve got an update on one of those stories, a look at a frankly quite scary USB device that doubles as malware, and a look at just how much the government doesn’t like apps that let you encrypt all your conversations. As we head into the “dog days of summer,” the security threats and the big stories keep adding up — but maybe we should be thankful we don’t have a multi-million-person data leak to discuss …

Read Listen

Checklist 102: The Head Shaking Edition

This week, we’ve dubbed our episode the “head shaking edition” because each of our stories today left us shaking our heads for one reason or another. From Google quietly looking over your shoulder to Comcast fumbling the ball with yet another big leak of user data, there’s plenty to discuss — so today we’re diving right in to our discussion. Items we’ll be ticking off the list as we go:

Google’s game of hide and seek
A look at behavioral biometrics
Comcast tells 26.5 million people, “Relax!”

Do you try to stay …

Read Listen

Checklist 101: Picture Imperfect

The summer marches on, and so does the parade of headlines and security concerns. From sneaky websites pretending to be someone they are not, to creepy social media spying thanks to an old and supposedly broken phone, and onward to concerns about requests for your info everywhere you go, we’re looking at a lot this week. We’ll look at those stories, discuss what you should know and what you can do (if anything), and more in today’s recap. Here are the topics we’ll be checking off on today’s list: …

Read Listen

Checklist 100: It’s Episode 100!

It has been a long time coming, but we are proud to celebrate the milestone achievement of 100 episodes of The Checklist, brought to you by SecureMac! We’d like to take this moment to say a big “thank you” to our listeners, especially those who’ve been here from the start. With such a big milestone, it seems appropriate that one of the top stories we have on our list this week concerns another gargantuan trove of personal data— and chances are, at least some of your information will probably …

Read Listen
Episode: Checklist 99: I Saw What You Did!

Checklist 99: I Saw What You Did!

It’s time for another look into the world of security news, where we’ll talk about where Apple stores your sensitive data, the latest and strangest anti-spam efforts, and more. This week we’re narrowing our focus to look at how Apple is handling some of the latest speed bumps in its efforts to grow while also trying to maintain its public commitment to customer privacy and data security. We’ve also got the latest nefarious scheme the bad guys are using to try and extort people on the web these days …

Read Listen

Checklist 97: Privacy Nightmare at 30,000 Feet

In the past, we’ve spent a substantial amount of time talking about the business of security flaws. Usually, it centers around things such as selling personal data on the Dark Web after stealing it using exploits and attacks. Credit card details, names, and addresses, and more — it all makes for a booming black market of data. That’s not the only kind of information sold on the Dark Web, though: sometimes, it’s the exploits that lead to gathering user data in the first place.

On this week’s episode, …

Read Listen

Checklist 96: The Latest Bugs, Flaws, and Privacy Worries

The summer keeps on heating up, so why not stay inside where it’s cool, and relax with the newest edition of The Checklist? As the temperatures outside climb, the headlines in the world of Mac security and beyond keep piling up too. This week, we’re touching on a few security hiccups in Apple products, talking about some welcome patches, and covering the latest creepy information about Facebook’s activities to splash into the news. On our agenda for today’s discussion are these topics:

Quick Look may lead to long looks
Apple code …

Read Listen

Checklist 95: Summer Security News

It seems like it was just yesterday that we were kicking off the new year and wondering what the months ahead would have in store for us. As we head into the first sweltering days of summer, it’s safe to say that the first half of the year has been jam-packed with bigger and more far-reaching stories than even we could have anticipated. With so much going on, it can be tough to keep up with all the headlines coming your way. Luckily, we have your back — we’ve …

Read Listen

Checklist 94: Facebook & Friends: More Privacy Concerns

Every week, we try to bring you the biggest news in the security world — or at least the most interesting developments that could affect us all. That’s why this week we’re diving into a brand-new subject we’ve never covered before… just kidding – Facebook has done it again. If it seems lately as though every week we have something new and usually concerning to discuss about the social media juggernaut, that’s because it’s the reality. Thanks to a new report in the New York Times, this week is …

Read Listen

Checklist 93: What’s New in Security News

Welcome to Episode 93 of The Checklist. Today, our attention turns towards security and insecurity — but we’re not talking about a long-lost Jane Austen novel. Instead, we’re taking a tour through the headlines to hit some of the big and interesting stories that have cropped up in the security sector over the past few weeks. Things we’ll be visiting on today’s list include:

The Zipperdown vulnerability
Puppy Pictures Preempt Privacy
The returning specter of Spectre
eFail: a big bug in email encryption
What does Apple know about you?

The answer to that last question may …

Read Listen

Checklist 92: Is There a Plumber in the Building?

In many of our recent episodes, we’ve spent plenty of time talking about data breaches, a subject that often dominates security conversations these days. For good, reason, too, as everyone from major credit bureaus such as Equifax to retail store chains have lost or mishandled user information in recent years. Data breaches aren’t the only ways your personal information ends up in the hands of people who might not be authorized to handle it, though — leaks can and do happen, too, and organizations could hand your data off …

Read Listen

Checklist 91 – Mix and Match 3.0

The 2018 parade of big tech and security headlines continues, and in recent episodes, we’ve touched on some pretty big developments. From Cambridge Analytica and Facebook scandals to the rollout of the General Data Protection Regulation in Europe, we’ve covered some major issues so far this year. In between all those banner headlines, though, there have been plenty of other important stories that haven’t been quite so big as to merit getting a show all their own. Today, we’re reaching into the grab bag for our third edition of …

Read Listen

Checklist 90: WHOIS GDPR: A Primer

Imagine if whenever you went to buy something — a car, perhaps — the information you handed over in the purchasing process became public record for anyone to see and search. All they’d have to do is plug your license plate in, and they’d be able to see your name, address, and phone number.

Read Listen

Checklist 89: Router Rundown

There are some items of technology in our lives that are so standard and ubiquitous because of how fundamental they are to the way things work that it’s very easy to take them for granted. Because we don’t pay a second thought to these things, we also quickly get stuck in security pitfalls and fall for traps that play on the fact that we don’t know or think very much about them. For example, have you ever really thought much about your router? With so many connected devices in …

Read Listen

Checklist 88: GrayKey’s Anatomy

How do you unlock your iPhone when you need to use it? Apple gives us a ton of options when it comes to keeping our information safe from prying eyes and unwanted intruders, from PINs to our fingerprints and our faces. Apple’s commitment to empowering users to take control of their privacy and security, though, has sometimes been the source of very public friction between the tech giant and law enforcement agencies such as the FBI. When Apple won’t help by providing a backdoor into user data, what option …

Read Listen

Checklist 87: The Anatomy of a Data Breach, Part 2

Welcome to Episode 87. Last week, we took an in-depth look at data breaches: from how they happen to a few of the biggest ones, and of course, what you can do to protect yourself when a big company loses your data, we covered a lot of ground in that show. We’ve got further to go still, though!  This week we’re continuing with our look into data breaches by turning our attention to the business side of things. These breaches don’t happen randomly, and how a company responds to …

Read Listen

Checklist 86: The Anatomy of a Data Breach, Part 1

During the course of your day, buy things, like gas, food, & lodging. Do you pay cash for all those things — or do you try to go back in time and operate on the barter system? Even if you do most of your business in day to day life with cash, chances are there are still at least some occasions when you pull out a card. For many more of us, debit and credit cards are an essential and irreplaceable part of daily life. Some restaurants, for example, …

Read Listen
1 14 15 16 17 18 21

Get the latest security news and deals