SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Checklist 168: It only FEELS like a recap

This week’s Checklist topics may sound familiar, but don’t be fooled! We revisit three stories that we’ve talked about before, but which now have some updates worth discussing (spoiler: it’s not all good news!).

On this week’s Checklist, it’s deja vu all over again:

$20 bucks and a security breach on pump four…revisitedLast week’s Communications Limits…revisitedBad passwords…revisited (again)

$20 on four: the case for paper money

Earlier in the year, we covered a story about gas station monitoring software that had serious vulnerabilities — serious enough to attract the attention of the Department of …

Read Listen

Checklist 165: Safe shopping for the holidays

This week’s Checklist gets you ready for the seasonal shopping rush (from a cybersecurity perspective, anyway). We’ll show you how to keep safe as you shop online; what gifts you might want to avoid; and how to make sure everything arrives as planned; and what to do when all the madness is over! 

This week’s Checklist covers:

How to shopWhat (not) to buyDeliveries and checkups

Shop smart, shop safe

Before you actually purchase anything online, there are a couple of basic precautions you should take — and one or two seasonal threats you need …

Read Listen

Checklist 164: Over the River and Through the Woods

A a complete guide to how to keep yourself safe during the holiday travel season. We’ll tell you what to do before you even walk out the door, how to protect yourself while you’re traveling, and what things to bear in mind when you reach your destination.

Read Listen

Checklist 162: Insecurity with a “light” touch

On this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out of a Hollywood thriller.

Here’s the Checklist for this week:

Taking the privacy out of VPNSIM-swapping 101An audio hack with a “light” touch

When VPNs go public

As many as 2,000 users of the popular VPN service Nord VPN may have had their accounts compromised in a credential stuffing attack.

Credential stuffing refers to the practice …

Read Listen

Checklist 161: The Fixes Are In (Again)

This week on the Checklist, we’ll catch you up on what Apple has been doing to keep you safe. We’ll talk about some adware apps that got the boot from the App Store. And finally, we’ll look at the cybersecurity implications of Catholicism 2.0.

This week’s Checklist covers:

A look at the security bits of this week’s Apple updatesAdware violating apps kicked out of the App StoreDo rosary beads really need an app? Really?

To opt in, or to opt out, that is the question…

This week, Apple released a bevy of updates for …

Read Listen

Checklist 159: What That and Tencent Will Get You

This week on the Checklist, we’ll look at a troubling connection between Apple and the Chinese government. We’ll revisit the issue of IoT security (spoiler: It’s not getting any safer out there). And we’ll round out the list with a reminder that when it comes to cybersecurity, sharing is caring!

This week’s Checklist is: 

What Website Warnings and Tencent will get youSecurity and an Internet of Things thingAnd would you please join our street team? We offer benefits! 

Apple’s silent partner

Last week MacRumors reported on a connection between Apple and Chinese tech giant …

Read Listen

Checklist 158: Catalina Bound

On this Checklist, we’ll take a look at the latest version of macOS. We’ll revisit two-factor authentication by way of a somewhat disappointing story involving Twitter. And we’ll round out the show with news of yet another data breach.

Read Listen

Checklist 157: Just Add S4LT

On this edition of The Checklist: The DoorDash data breach, Considering risks around AltStore, And the security side of recent Apple updates.

Read Listen

Checklist 156: Watches and Warnings

On this edition of The Checklist: A third-party keyboard warning from Apple, How much is too much consumer protection?, and Apple Watch privacy in an always on world.

Read Listen

Checklist 154: Should you put a Ring on it?

On this edition of The Checklist we discuss Warnings from Facebook about warnings about Facebook, ‘Amazon, your neighbours, and the police wanna put a Ring on it’, and When smart things turn dumb.

Read Listen

Checklist 152: Sharing is Scaring

On this edition of The Checklist: Convenience versus privacy on Yelp, Tips for staying digitally safe on campus, and Everybody needs to update their everything!

Read Listen

Checklist 151: Too Close for Security Comfort

This week on the Checklist podcast, we’ll talk about how to deal with security risks that come from those closest to you (literally). We’ll take you through some bad iOS news from the past week, and also discuss how it relates to a larger issue related to mobile security. And finally, we revisit a familiar topic—passwords—and tell you about some newly released Google research that probably means we’ll have to keep talking about passwords for the foreseeable future. Here’s our weekly Checklist:

Protecting your data from the people – literally – …

Read Listen

Checklist 149: Security Tripping with The Checklist

This week, we say hello to August with a groan as news of more big data breaches that could affect our financial lives comes out. Then we’ll pivot to talk about how you can stay safe when you squeeze in one last summer vacation before autumn arrives, and we’ll round things out with a follow-up to a follow-up. It’s in the name of the show — so here’s this week’s checklist of stories:

The Bad/Worse Breach7 Tips for TripsA Stronger Little Snitch

Let’s not waste any time as we embark on a …

Read Listen
1 11 12 13 14 15 21

Get the latest security news and deals