BlogMany people are aware that large tech companies like Facebook and Google collect and monetize user data . But privacy advocates are now sounding the alarm about the growing trend of consumer banks and credit card companies doing the same thing.
January 6, 2020 •
8 min read
SecurityThe Checklist is taking a little holiday break this week, but we’ll be back on the 9th of January with a new podcast. Until then, we’d like to invite you to check out these classic Checklists you might have missed, especially as they touch on topics that have been in the news of late!
In what follows, we’ll let you know what’s been going on in the world of cybersecurity for the past week, and then we’ll point you to a Checklist where you can learn more.
This Best of the Checklist …
January 2, 2020 •
5 min read
BlogThis year was a big one for cybersecurity news, with plenty of stories worthy of inclusion in a year-end review. We’ll take you through the top stories of 2019 which help us see the shape of things to come.
December 27, 2019 •
8 min read
BlogIt’s that time of year again, when Santa makes his list, checks it twice and, well, you know the rest. So in the spirit of the season, we’re going to take a look at some of the top Apple stories of 2019 to see if the company was naughty or nice this year.
.nice {background: rgb(107,219,107);
background: -moz-linear-gradient(left, rgba(107,219,107,1) 0%, rgba(5,112,0,1) 100%);
background: -webkit-linear-gradient(left, rgba(107,219,107,1) 0%,rgba(5,112,0,1) 100%);
background: linear-gradient(to right, rgba(107,219,107,1) 0%,rgba(5,112,0,1) 100%);
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr=’#6bdb6b’, endColorstr=’#057000′,GradientType=1 );-webkit-background-clip: text;
-webkit-text-fill-color: transparent; text-shadow: none;
}
.naughty{background: rgb(174,55,72);
background: -moz-linear-gradient(left, rgba(174,55,72,1) 0%, rgba(109,23,31,1) 100%);
background: -webkit-linear-gradient(left, …
December 20, 2019 •
9 min read
SecurityThis week’s Checklist topics may sound familiar, but don’t be fooled! We revisit three stories that we’ve talked about before, but which now have some updates worth discussing (spoiler: it’s not all good news!).
On this week’s Checklist, it’s deja vu all over again:
$20 bucks and a security breach on pump four…revisitedLast week’s Communications Limits…revisitedBad passwords…revisited (again)
$20 on four: the case for paper money
Earlier in the year, we covered a story about gas station monitoring software that had serious vulnerabilities — serious enough to attract the attention of the Department of …
December 19, 2019 •
11 min read
InterviewsGeorgia Weidman is a penetration tester, security researcher, writer, trainer, and entrepreneur.
She is the author of a highly-regarded book which teaches the fundamentals of penetration testing, Penetration Testing: A Hands-On Introduction to Hacking, and has taught security courses and conducted advanced training sessions at such prestigious venues as Black Hat, Tulane University, West Point, and the NSA.
Weidman is also the founder of Shevirah, a company focused on mobile device and Internet of Things (IoT) security, as well as Bulb Security, a cybersecurity …
December 17, 2019 •
13 min read
SecureMac Company Press ReleasesCybersecurity firm has changed with threat landscape; looks to future
December 17, 2019 •
3 min read
SecurityCupertino rolled out new features and bug fixes for all of its operating systems, so we’re going to take a look at last week’s security news broken down by OS.
December 12, 2019 •
8 min read
MalwareThe new malware sample bears similarities to the well-known AppleJeus malware, which targets cryptocurrency exchanges. AppleJeus is the product of Lazarus Group, a shadowy cybercrime organization believed by many to be linked to North Korea.
December 10, 2019 •
6 min read
SecurityOn this week’s Checklist, we’ll look at some dumb ways to buy a smartwatch. We’ll share a PSA from the FBI. And we’ll talk politics and app security by way of FaceApp.
December 6, 2019 •
13 min read
BlogSo you’re the proud owner of a brand new Mac — wonderful!
You’re no doubt eager to try out all the bells and whistles; install your favorite apps; start using your new machine. We know the feeling.
But part of setting up a new macOS device should always be making sure it’s secure — and that’s what we’re going to cover in this quick setup guide. Follow these “Day 1” steps so you can enjoy your Mac with confidence in the weeks, months, and years to come.
article span.backnum { font-family:”Open Sans”, sans-serif; …
December 3, 2019 •
10 min read
SecurityThis week’s Checklist gets you ready for the seasonal shopping rush (from a cybersecurity perspective, anyway). We’ll show you how to keep safe as you shop online; what gifts you might want to avoid; and how to make sure everything arrives as planned; and what to do when all the madness is over!
This week’s Checklist covers:
How to shopWhat (not) to buyDeliveries and checkups
Shop smart, shop safe
Before you actually purchase anything online, there are a couple of basic precautions you should take — and one or two seasonal threats you need …
November 29, 2019 •
11 min read