SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Checklist 85: Facebook Follies

When you log on to Facebook, do you still feel like you’re having fun? The social network used to be an awesome place to reconnect with old friends and keep in touch with family. Today, more people than ever are choosing #DeleteFacebook.

While Facebook is a free service in theory, since no one pays to sign up for an account, it turns out the real costs are much higher than any subscription fee. From the Cambridge Analytica story we reported on recently to even more unwelcome news about privacy …

Read Listen

Checklist 84: Machine learning. Deep learning. Neural networks. Artificial...

Machine learning. Deep learning. Neural networks. Artificial intelligence… it’s starting to feel like we’re in an Isaac Asimov novel! For this week’s episode of The Checklist, we’re diving in to the latest ways computers and technology are being trained to complete complex tasks, make inferences, and do more overall. From Google training computers to identify specific objects in images to the way anti-malware software figures out how to detect and stop new variants, there are plenty of cool applications for this innovative technology. However, there are some pretty creepy things …

Read Listen

Checklist 83: More Security Fails

It’s that time again — time for us to pull back for a “big picture” look at some of the big missteps in computer security over the recent weeks and months. Some of today’s stories relate to Apple, some don’t, but all of them fall into the category of a classic “security fail.”

Read Listen

Checklist 81: Facebook’s Privacy Failures Leave You in the Cold

If you’ve been listening to the news recently, you’ve probably heard the name “Cambridge Analytica” come up — and all kinds of stories about the data firm’s former executives claiming they could manipulate and intimidate large numbers of people with crafted, targeted social media content.

Read Listen

The Checklist 80: Digital Legacies

For all our listeners of The Checklist, it is no secret that we are strong advocates for security. Usually, we come on this show to talk about how to secure your digital life and keep unauthorized individuals from snooping through your information. Security is important, and in just about every situation, it’s not just desirable — it’s necessary. There is one unfortunate scenario, though, when it quickly causes problems: when you’re not around anymore to enter your password or walk through the reset process.

On today’s show, we’re thinking about the …

Read Listen

Checklist 79: Cryptocurrency and Your Web Browser

Last year, we visited the subject of Bitcoin and the technology behind it, the blockchain, in Episode 59 of The Checklist. In just a few short months since that episode, the price of one Bitcoin exploded, hundreds of new cryptocurrencies appeared, and company after company seems to be jumping on the bandwagon. By the way—you’re now listening to The Blockchain Checklist by SecureMac!

We’re only kidding — but blockchain and cryptocurrency are a bigger deal than ever before, and while it may excite investors, these technologies are also beginning …

Read Listen

The Checklist 78: The Perils and Pitfalls of Old Software and Hardware

In the time since we started The Checklist, we’ve reported on and discussed a variety of stories that, time and time again, come back to the same foundation: hackers breaking into the computers in our homes and businesses by exploiting weaknesses in old hardware or software. While not everyone can always afford to keep their computers upgraded to the latest, greatest hardware, there are many reasons users may want to or need to run old programs on old machines.

On today’s episode of The Checklist, we’re looking at the risks inherent …

Read Listen

The Checklist 77: Mix and Match Part II

As 2018 continues, so does the flood of new stories, threats, and developments in the security world. Just recently, we reached into the grab bag to take a quick look at a variety of different stories; this week, we’re going back again to pull out a mixture of the most prominent topics making a splash in the headlines over the past couple of weeks. From the consequences of tracking your exercise with an app to the pitfalls of perfectly proper grammar, we’ve got a lot of ground to cover in today’s show

Read Listen

The Checklist 76: Apple Watch and Security

Way back in 2007, Apple released the iPhone and changed the world overnight by putting the power of an iPod, a phone, and the Internet right in our pockets. The iPhone quickly relegated the iPod to the annals of history, and for better or worse, it all but killed the wristwatch too. Then Apple decided it was time to bring the watch back to life — and thus, the Apple Watch was born.

Read Listen

The Checklist 75: Mix and Match

Spectres, Meltdowns, and an endless parade of patches — 2018’s already off to quite a start, and it can all be just a little overwhelming. This week, we’re pulling back to the bigger picture and reaching into the grab bag for a Mix & Match episode as we cover a slew of stories from this past month!

Read Listen

The Checklist 74: Overall iOS Security Features

Your iPhone is secure, right? That’s the general impression, anyway — and it’s certainly an impression Apple has worked hard to maintain over the years. It’s easy enough to call it secure, but what is in place to keep you safe? What does Apple do to protect its users day after day, and do we ever need to go beyond the “out of box” security experience? On today’s edition of The Checklist, we’re talking about the overall security features you’ll find in iOS, whether you’re an iPhone or an iPad user

Read Listen

Checklist 73: Meltdown, Spectre and You!

On today’s edition of The Checklist, we’re tackling the complex topics of Spectre and Meltdown, arguably two of the biggest and most far-reaching security vulnerabilities we’ve ever seen. Among those impacted are everyone from iOS and macOS users to Windows machines and just about anything powered by an Intel processor around the world!

Read Listen

Checklist 72: 2017 Security Review Part Two

Last week, we brought you Part One of our 2017 Security Year in Review. This week, we’ll wrap that up with Part Two! If you didn’t get a chance to check out Part One yet, the episode and its accompanying show notes are available right here in our archives. In it, you’ll find out about the highlights of the past year in both iOS and macOS security, including all the information you need to know about what the bad guys were up to in 2017. This week, we’re pulling back …

Read Listen

Checklist 71: 2017 Security Review Part One

For this, Episode 71 of The Checklist, we sat down during the first week of January 2018 to put a magnifying glass over the year that just ended. For part one of our discussion, we’re taking an in-depth look at the biggest security issues that affected macOS and iOS in 2017. With so many things going on — and there were quite a lot — it can be tough to remember all the details. To start our recap, we’ll go all the way back to this time one year ago: the beginning of January.

Read Listen

Checklist 70: Apple’s No Good Very Bad Security Quarter

For more than a year, we’ve been taking a little time every week here at The Checklist to bring you a podcast focused on and around the security of the Mac, iOS devices, and the Apple platform in general. We all know that was silly, though — after all, there aren’t any major security problems with Apple, right?

There is no such thing as 100% safe & secure, although it has indeed been the case that Apple systems experience fewer major vulnerabilities and problems than their counterparts, generally speaking. …

Read Listen

Checklist 69: When Kids Are Targeted

In Episode 68, we spent some time talking about all the ways the bad guys can try to target the elderly online and over the phone. This week, we’re running all the way down to the other end of the age spectrum to look at the ways troublesome bad actors might target your kids. We’ll also discuss how these nefarious rogues may set their sights on your children as a way to target you, the parent, as their endgame.

Read Listen

Checklist 68: Scams That Target the Elderly

As we went into Thanksgiving a few weeks ago, we urged you to have some proactive talks with your family about how to stay safe while using their computers, especially on the Internet. We also covered how you could take action to lay the groundwork to make sure everything stays in good working order. Now, as we head deeper into the holidays, we’d like to ask our listeners to keep an ear out as we return home once more to spend time with our extended families.

Previously, our discussions …

Read Listen

Checklist 67: The Latest Security Features in iOS 11: Part Two

Recently, in episode 66, we looked at the latest security features Apple has built into macOS. Last week, we began to explore what’s new and different in iOS 11. While the basics of iOS haven’t changed in some time, time and different development approaches mean that all kinds of features transform behind the scenes with every update. We looked at the innovative FaceID system, improvements to backup security, and new physical security features. This week, we’re returning to the topic of iOS 11 for one more dive into what’s …

Read Listen

Checklist 66: The Latest Security Features in iOS 11: Part One

Have we ever talked about the security features built into iOS itself? Of course — we’ve covered that subject in many previous episodes, but things change. When The Checklist began, users were still walking around with iOS 9. Now we’re up to iOS 11, and Apple continues to make things more secure as they go. Even before iOS 11, Apple’s mobile system had some serious security protections and features, but they’ve added some new ones and refined others, so it’s time to revisit the topic.

Read Listen
1 15 16 17 18 19 21

Get the latest security news and deals