SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Checklist 72: 2017 Security Review Part Two

Last week, we brought you Part One of our 2017 Security Year in Review. This week, we’ll wrap that up with Part Two! If you didn’t get a chance to check out Part One yet, the episode and its accompanying show notes are available right here in our archives. In it, you’ll find out about the highlights of the past year in both iOS and macOS security, including all the information you need to know about what the bad guys were up to in 2017. This week, we’re pulling back …

Read Listen

Checklist 71: 2017 Security Review Part One

For this, Episode 71 of The Checklist, we sat down during the first week of January 2018 to put a magnifying glass over the year that just ended. For part one of our discussion, we’re taking an in-depth look at the biggest security issues that affected macOS and iOS in 2017. With so many things going on — and there were quite a lot — it can be tough to remember all the details. To start our recap, we’ll go all the way back to this time one year ago: the beginning of January.

Read Listen

Checklist 70: Apple’s No Good Very Bad Security Quarter

For more than a year, we’ve been taking a little time every week here at The Checklist to bring you a podcast focused on and around the security of the Mac, iOS devices, and the Apple platform in general. We all know that was silly, though — after all, there aren’t any major security problems with Apple, right?

There is no such thing as 100% safe & secure, although it has indeed been the case that Apple systems experience fewer major vulnerabilities and problems than their counterparts, generally speaking. …

Read Listen

Checklist 69: When Kids Are Targeted

In Episode 68, we spent some time talking about all the ways the bad guys can try to target the elderly online and over the phone. This week, we’re running all the way down to the other end of the age spectrum to look at the ways troublesome bad actors might target your kids. We’ll also discuss how these nefarious rogues may set their sights on your children as a way to target you, the parent, as their endgame.

Read Listen

Checklist 68: Scams That Target the Elderly

As we went into Thanksgiving a few weeks ago, we urged you to have some proactive talks with your family about how to stay safe while using their computers, especially on the Internet. We also covered how you could take action to lay the groundwork to make sure everything stays in good working order. Now, as we head deeper into the holidays, we’d like to ask our listeners to keep an ear out as we return home once more to spend time with our extended families.

Previously, our discussions …

Read Listen

Checklist 67: The Latest Security Features in iOS 11: Part Two

Recently, in episode 66, we looked at the latest security features Apple has built into macOS. Last week, we began to explore what’s new and different in iOS 11. While the basics of iOS haven’t changed in some time, time and different development approaches mean that all kinds of features transform behind the scenes with every update. We looked at the innovative FaceID system, improvements to backup security, and new physical security features. This week, we’re returning to the topic of iOS 11 for one more dive into what’s …

Read Listen

Checklist 66: The Latest Security Features in iOS 11: Part One

Have we ever talked about the security features built into iOS itself? Of course — we’ve covered that subject in many previous episodes, but things change. When The Checklist began, users were still walking around with iOS 9. Now we’re up to iOS 11, and Apple continues to make things more secure as they go. Even before iOS 11, Apple’s mobile system had some serious security protections and features, but they’ve added some new ones and refined others, so it’s time to revisit the topic.

Read Listen
Episode: Checklist 65: An Overview of the Mac’s Most Important Built-in Security Features

Checklist 65: An Overview of the Mac’s Most Important Built-in Security...

For this week’s show, we’re back to talking about the Mac — more specifically, addressing some of the most important security features baked directly into macOS. What steps has Apple taken to keep users safe, and what tools are there to make sure we’re all enjoying our Macs safely and securely? Perhaps you know someone who is about to get a new Mac, or maybe you’re even the one giving it as a gift for the holidays! Being able to learn about staying safe on a new machine is important. …

Read Listen

Checklist 64: Safely Shopping for Technology This Holiday Season

The holiday shopping season has arrived again — and with this episode, we’re turning our attention to some security issues specific to this time of year. With Christmas coming up, you might be looking at all kinds of electronic gadgets for your friends and family. From tech-based toys to Internet of Things products, retailers have more web-connected devices available for us every year.

While it’s certainly a fun time of year, opening some of these gifts during the holidays could also mean opening up your loved ones to a …

Read Listen

Checklist 63: Your Guide to Securing Your Parents’ Computer

During last week’s episode, our discussion centered around talking to your parents about the importance of computer security, and how to educate them on essential steps to take. This week, we’re going to move beyond the parents and look at their computers ourselves —with their permission of course! After your pep talk about strong passwords, you should hope to find their computer protected with a password you can’t guess.

While it’s easy enough to explain how to do things like create strong passwords and to run security software as …

Read Listen

Checklist 62: Talking to Your Parents About Computer Security

Remember back when you were a kid, and someone sat you down to have “The Talk”? It might have been your parents, or it could have been a teacher, but we’ve all been through the experience of learning about “the birds and the bees.” It’s a pivotal moment, and learning about the facts of life can be, well, life-changing. It’s also essential for keeping you safe as you continue to grow up. Well, now you’re grown — you’re older and definitely a little wiser. It might be time to sit down with your parents and have your own version of The Talk with them.

Read Listen

Checklist 61: App Stores, Malware, and How Security Firms Do Their Jobs

For years, people laboured under the misconceptions that Apple hardware and operating systems were immune to the threats and malware faced by the people who use Windows. While macOS may be stronger in some respects, what made the Mac the safest was the fact that relatively few people used it compared to Windows. But times have changed! For most of the past decade, growth for Apple machines has outpaced that of Windows machines. General consumers “saw the light” through the iPod and the iPhone and decided to give the …

Read Listen

Checklist 60: Safety in the App Store

Our lives are on our computers and our phones: there’s no getting around that fact. One day, we might look back on that and view it as a mistake, but for now, our finances, health records, communications, family photos, videos, and more all live on these devices. Keeping that information safe is important, and there are several layers of complexity to that challenge. From password practices to two-factor authentication and even to merely protecting your screen from prying eyes, we’ve covered a lot of these tactics on this show. …

Read Listen

Checklist 59: Bitcoin and the Blockchain: Understanding Cryptocurrency and Its...

Today, we’ll be tackling a couple of buzzwords in the tech industry today: blockchains and Bitcoins. Not unlike HTTPS and botnets, blockchain and Bitcoin are terms that are starting to seep into everyday use. Before we all start using them, though, we should figure out what they mean and how they work! In fact, the blockchain concept has even begun to garner its own “buzzword” status in the security community regarding how secure it can be for storing and accessing information. So, for all our listeners who aren’t even …

Read Listen
Episode: Checklist 54: The Equifax Hack

Checklist 54: The Equifax Hack

The personal information of 143-million people may have been compromised when the consumer credit reporting agency Equifax was hacked. What do we know about the attack? And what can we do going forward?

Read Listen
1 16 17 18 19 20 21

Get the latest security news and deals