Checklist 205: Staying Out of the Hospital and Getting Out the Vote
This week on the Checklist, we’ll cover two timely topics: cyberattacks on hospitals, and a voting contingency plan.
Read ListenSecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!
This week on the Checklist, we’ll cover two timely topics: cyberattacks on hospitals, and a voting contingency plan.
Read ListenThe 2020 U.S. elections are just days away, and cybercriminals — some motivated by politics, others by financial gain — are stepping up their attacks. We’ll let you know what’s happening on this edition of the Checklist.
Voter intimidation emails attributed to Iran
We’ve talked before about the issue of foreign adversaries attempting to interfere with the upcoming U.S. elections, but this week a disturbing new development came to light.
According to the FBI and Director of National Intelligence John Ratcliffe, Russia and Iran have obtained the voter registration data of American citizens, …
Read ListenOn this week’s Checklist, we’ll cover:
How Macs are perceived in the enterpriseAn addendum to last week’s T2 storyA checklist of security tips from the NCSA
Survey says…
Do you feel like your Mac is the best choice for security? You’re not alone.
A recent survey conducted by enterprise software management platform Jamf asked businesses—both ones that used Macs and ones that didn’t—what they thought about the Mac in terms of security.
Across the board, 77% of all organizations polled said that they believed the Mac to be more secure “out of the box”, though …
Read ListenThis week’s big news: an “unpatchable” hardware vulnerability affecting Apple’s T2 security chip! But how serious is it, really? We spoke with Mac security expert Patrick Wardle to separate the facts from the clickbait headlines. We’ll cover:
the technical backgroundwho’s impacted (and what they can do)
Parsing the T2 story
The Apple security community was abuzz this week with news of an unpatchable vulnerability in the T2 security chip found in newer Macs.
To begin with, a quick refresher: The T2 chip is essentially a co-processor that handles much of the Mac’s security functionality, …
Read ListenOctober is National Cybersecurity Awareness Month, and the National Cybersecurity Alliance has kicked things off by releasing some timely recommendations for 2020.
Read ListenOn this week’s Checklist, we discuss a rapidly changing App Store story, we talk about streaming services and privacy, and we show you how to keep your wits in a cybersecurity emergency.
Read ListenWith iOS 14 out for less than 24-hours, now is an excellent time to look at some of its privacy improvements. Nick Leon joins us to address them.
Read ListenDid you know that some podcasts actually track their listeners? Rob joins us today to talk about how the tracking occurs and about a new tool on the way to fight it.
Read ListenOn this Checklist, we talk with cloud security expert Dominique West. The conversation covers career paths in infosec, today’s changing threat landscape, common misconceptions about cloud security, and the importance of community to the industry.
Read ListenSecurity pro Patrick Wardle is writing a book, and he may just want your help. We’ll cover some Mac malware basics, talk about the book he’s writing, and how the security and Mac communities can help on episode 196 of The Checklist, brought to you by SecureMac.
Read ListenThe 2020 U.S. election is under attack. Who’s doing it? Why? How? And what can we do stop it? SecureMac’s Nick Leon joins us to talk it over.
Read ListenThis week, The Checklist takes you inside yet another high-profile Bitcoin scam, this time affecting YouTube. We’ll talk about what happened, and then discuss the technical details of the compromise.
Read ListenWe’re bringing you a WWDC outtake: an off-the-cuff, practically off-mic discussion of WWDCs past — as well as the roles Apple execs play.
Read ListenStarting this year, Apple will begin making its own, ARM-based processors for the Mac. In this episode of The Checklist, we take a look at the background to this change, as well as what it means for Mac users:
Intel vs ARMApple Silicon Macs and performanceApple Silicon Macs and security
Goodbye Intel, Hello ARM
When Apple announced their move from the Intel to the ARM processor architecture, it was clearly big news. But it also left many folks with a pretty basic question: What’s the actual difference between the two?
At a hardware level, …
Read ListenA week behind us, the great Twitter hack is still unfolding. We’ll look at what we think we know so far and why the hack itself matters on this edition of The Checklist, brought to you by SecureMac.
Read ListenTikTok. Harmless fun? Or existential threat to the United States? The answer you get depends on who you ask. This week we have a special guest to help us discuss the question in depth — and we’ll get into the larger issues with apps, user data, and digital privacy.
TikTok, apps, and your privacy
In recent weeks, the popular video-sharing app TikTok has made headlines for its practice of monitoring iOS pasteboard data. The pasteboard — kind of a system-wide clipboard for iOS that lets apps access the information copied there — …
Read ListenThis week, we dive a bit deeper into some WWDC20 announcements with developer Brett Terpstra
Read ListenIn the movies, bad guys are often taken down by a tech vulnerability. This week, we revisit our look at how best practices could make bad guys better at being bad.
Read ListenOn this week’s Checklist, we cover the biggest Mac news to come out of Apple’s 2020 Worldwide Developer Conference, including a new macOS and Safari, a new processor for Macs and a new way to log in to websites.
Read ListenThe Checklist will return next week with coverage of WWDC 2020. In the meantime, we’ll catch you up on the latest cybersecurity news — and share several Checklists from the archives that shed light on these stories.
Read Listen