The Senate votes for warrantless surveillance. Here’s what you can do.

The Senate votes for warrantless surveillance. Here’s what you can do.

The U.S. Senate recently voted to allow law enforcement and intelligence agencies to access people’s web and search history without a warrant.

In this article, we’ll unpack what that means for people living in or visiting the United States — and we’ll tell you what you can do about it.

The legal background

The vote was part of the debate over the re-extension of the Patriot Act, an Act of Congress passed shortly after the September 11 terrorist attacks. 

The law grants government agencies broad surveillance powers when conducting investigations that bear on matters …

May 20, 2020 • 7 min read
Getting back to security basics

Getting back to security basics

The Covid-19 pandemic has changed the way we live, work, and study — and has created new digital security and privacy issues as well. 

But as they say, sometimes the more things change, the more they stay the same. 

In this short piece, we’ll share three recent news stories about cybersecurity threats brought on by the coronavirus crisis. Then we’ll explain how following “the basics” of good personal security can keep you safe from these threats (and others like them).

Phishing Awareness

More people than ever are working from home — many of them …

May 20, 2020 • 7 min read
Bridgefy: The Hong Kong protest messenger app

Bridgefy: The Hong Kong protest messenger app

The Hong Kong protests have captured the world’s attention for several months now. While we’ll leave the political commentary to others, one noteworthy feature of these events is the way in which technology has played a pivotal role in helping the protesters to organize and to thwart the efforts of a much more powerful adversary.

There are numerous examples of this, but one in particular may be of interest to people who follow cybersecurity (and who are interested in digital privacy generally): Bridgefy.

What is Bridgefy, and why should I care?

Bridgefy is …

May 19, 2020 • 10 min read
Is XProtect enough to keep you safe?

Is XProtect enough to keep you safe?

Mac malware threats are now increasing more rapidly than their Windows counterparts. With threats to macOS growing more prevalent and sophisticated, many users are starting to wonder if Apple’s native security features are enough to keep them safe.

In this article, we’ll examine one of these built-in Mac protections: XProtect. We’ll take a look at what XProtect is, how it works, and how it stacks up against third-party anti-malware solutions.

What is XProtect? 

XProtect is Apple’s basic malware detection service for macOS, part of the Gatekeeper security feature. XProtect scans downloaded files for …

May 18, 2020 • 7 min read
The difference between a VPN and a proxy

The difference between a VPN and a proxy

You’ve heard of VPNs, and you may have come across the term “proxy” or “proxy server” before. If you’re like most people, you may be wondering if there’s actually a difference between the two — and asking yourself whether or not a VPN is more secure than a proxy.

The short answer is that VPNs and proxies perform similar functions, but do so in different ways. Depending on your needs, one of them is probably a better choice than the other. 

In this short article, we’ll explain the differences between VPNs and …

May 18, 2020 • 7 min read
Checklist 185: Real Looking Scams and Fake Looking Help

Checklist 185: Real Looking Scams and Fake Looking Help

This week on the Checklist, we cover:

Deeper analysis of Covid-19 scam domainsBank whose letters set off alarm bellsPossible GDPR problem for Germany’s Apple Stores

Coronavirus scam sites: a taxonomy

For the past couple of months, we’ve covered stories related to Covid-19 scams and security threats. One thing we noted early on was a surge in domain name registration for new websites related to the pandemic. While many of these were completely legitimate, initial research indicated that an unusual number of these new domains were malicious. 

In an effort to better understand the threat …

May 14, 2020 • 8 min read
Kaiji malware: a new IoT threat

Kaiji malware: a new IoT threat

Security researchers have discovered a new family of malware, dubbed “Kaiji”, that targets Internet of Things (IoT) devices and Linux servers.

May 13, 2020 • 6 min read
Checklist 184: Safe Passwords with Bart Busschots

Checklist 184: Safe Passwords with Bart Busschots

This week on the Checklist, we sit down with a special guest to talk about passwords — plus we’ll update you on Google’s efforts to build a safer smart home.

Passwords for humans

If you’ve listened to the Checklist before, you know that the importance of good passwords is a favorite theme of ours — because it’s such a fundamental aspect of digital security and privacy.

This week, we sat down to talk with Bart Busschots, creator of xkpasswd, a web-based tool that helps users generate strong, unique passwords that are actually easy …

May 7, 2020 • 16 min read
Checklist 183: Tracing the Contact Tracing Story

Checklist 183: Tracing the Contact Tracing Story

This week, we’ll highlight some big decisions about mobile contact tracing from around the world — and we’ll also let you know what’s going on over at Apple (spoiler: get ready to update iOS).

April 30, 2020 • 7 min read
What is Fleeceware?

What is Fleeceware?

The term “fleeceware” was coined by the British security researchers who have been investigating it. It refers to apps that charge an excessive monthly subscription fee after a brief trial period has ended — even if a user has uninstalled the app from their device.

April 17, 2020 • 6 min read