SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Episode: Checklist 50: Hacking Your Health

Checklist 50: Hacking Your Health

On today’s episode, we’re looking at the way technological change has affected modern medicine, threats the healthcare industry faces, and what we can do to protect patient safety now and in the future.

Read Listen
Episode: Checklist 49: Artificial Intelligence and Security

Checklist 49: Artificial Intelligence and Security

The rise of artificial intelligence in the consumer space seems to have happened overnight. It feels like we’ve gone from Apple’s introduction of Siri to virtual assistants everywhere in the blink of an eye. On today’s episode, we’ll be covering some security concerns that accompany the rise of AI.

Read Listen
Episode: Checklist 48: All About Spyware

Checklist 48: All About Spyware

On today’s episode we’ll be taking a look at spyware: what it does, where it comes from, and what you can do to defend against it.

Sometimes it’s pretty obvious when you’ve got a malware infection – ransomware lets you know that your files have been encrypted and are being held for ransom, while adware spawns endless popups in your web browser. Spyware operates a bit differently, and unlike other types of malware it prefers to remain hidden on an infected system. It might come as a surprise, but some spyware …

Read Listen
Episode: Checklist 46: A Brief History of Malware

Checklist 46: A Brief History of Malware

On today’s Checklist, we’re cracking open the history books! We’ll be looking at the evolution of malware: from the early days of “joke” viruses to the serious threat it poses today.

Read Listen
Episode: Checklist 42: The Internet of Things: New Devices, New Concerns

Checklist 42: The Internet of Things: New Devices, New Concerns

Today, Internet connectivity doesn’t just include computers and phones. It’s lights, cameras, thermostats, and more. It’s called the Internet of Things, and it’s the topic of today’s show! In this episode we’ll be taking a closer look at security concerns that come with all these new IoT devices.

Read Listen
Episode: Checklist 40: Apple’s Hacker History

Checklist 40: Apple’s Hacker History

Ransomware, malware, DDoS attacks… Those are the kinds of things we tend to think of when someone says the work “hacker” today. That’s not what the word used to mean, though. We’re doing a bit of hacker history on today’s checklist, looking at Apple’s hacker roots and how that led to the ever growing Apple ecosystem.

Read Listen
Episode: Checklist 39: 5 Ways to Work Towards New Security Skills

Checklist 39: 5 Ways to Work Towards New Security Skills

Ever wonder how to become a computer security expert? On this edition of The Checklist, we’re looking at ways that anyone with a drive for it can pick up computer security skills and start down the path to becoming a computer security professional.

Read Listen
Episode: Checklist 38: 5 Things to Know About WannaCrypt

Checklist 38: 5 Things to Know About WannaCrypt

The world saw one of the largest ransomware attacks conducted so far just a couple of weeks ago. The story has captured public attention for longer than most digital security stories, and for good reason. From its shadowy origins to its very visible effects, the ransomware known as ‘WannaCrypt’ or ‘WannaCry’ is the topic for today’s edition of The Checklist.

Read Listen
Episode: Checklist 37: Gone Phishing

Checklist 37: Gone Phishing

There are bad guys out there who want to trick you into giving them your sensitive information. “Phishing,” as this practice of impersonation is known, is nothing new. With so much money flowing online and so much personal data available, more and more people are going phishing, which is the topic for today’s episode!

Read Listen
Episode: Checklist 36:  Spring Malware Roundup

Checklist 36: Spring Malware Roundup

We are only halfway through Spring 2017 here in the states, and yet the season has already seen a lot of news-making malware. On today’s Checklist, we’ll break down the latest developments and cover what you need to know — and, where possible, how you can protect yourself.

Read Listen
Episode: Checklist 35: Q&A Grab Bag Redux

Checklist 35: Q&A Grab Bag Redux

This week we’re talking to you: Part II! It’s been awhile since our last Q&A episode, but the questions haven’t stopped coming in… and on today’s show we’ll answering questions sent in by listeners like you.

Read Listen
Episode: Checklist 34: Sharing Preferences in macOS

Checklist 34: Sharing Preferences in macOS

Did you know that your Mac has a powerful suite of built-in sharing tools? Some of them are pretty straightforward, but others could used a bit more explanation. On today’s episode, we’ll cover the macOS Sharing Preferences: what you can do with them, and the potential impact they can have on your Mac’s security.

Read Listen
Episode: Checklist 33: What to Do When You’ve Lost Your Mac’s Password

Checklist 33: What to Do When You’ve Lost Your Mac’s Password

What happens if you forget the password for your Mac? The good news is, your data is safe… the bad news is… you can’t have it. Luckily, there’s a lot you can do to try to get back into your Mac if you’ve forgotten your password. We’ll look at some of those on today’s Checklist.

Read Listen
1 17 18 19 20 21

Get the latest security news and deals