SecurityA a complete guide to how to keep yourself safe during the holiday travel season. We’ll tell you what to do before you even walk out the door, how to protect yourself while you’re traveling, and what things to bear in mind when you reach your destination.
November 21, 2019 •
12 min read
SecurityOn this edition of The Checklist: Apple Mail Encryption, Now with Less Encryption!, Ransomware Revisited, and A Ring of Insecurity.
November 14, 2019 •
10 min read
BlogPrivacy is hard to come by these days. Malicious actors, large corporations, and governments are constantly trying to look over your shoulder when you’re online.
But some in the tech community are fighting back. Tools like ad blockers, no-track browsers, and VPNs can help keep digital snoops in check.
One of the most important of these technologies is encrypted messaging, which is available through a number of third-party and native applications.
So how do these messengers work? Are they all the same? And the million dollar question: Are they truly secure? Here’s what …
November 13, 2019 •
8 min read
BlogPatrick Wardle is a security researcher and software developer whose areas of expertise include macOS malware and nation-state threats.
Wardle is Principal Security Researcher at Jamf and creator of the Objective-See suite of security tools. He is also the founder of the world’s premier Mac security conference: Objective by the Sea.
We caught up with Patrick to talk about macOS security as well as the advanced threats being created by nation-state actors around the world.
CNN once called Patrick Wardle “a sweet guy” who could “hack …
November 12, 2019 •
24 min read
BlogDigital forensic analysts are the Sherlocks of cybersecurity, gathering and interpreting evidence from digital sources for use in criminal or civil court cases. While the field of digital forensics is an interesting topic in its own right, it’s also worth learning about if you’re interested in digital privacy issues.
Understanding how digital forensic analysts work—and in particular, what they look for in their investigations—can teach you a lot about what’s going on behind the scenes on your computer. And once you know that, you can take steps to better protect your …
November 11, 2019 •
8 min read
SecurityOn this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out of a Hollywood thriller.
Here’s the Checklist for this week:
Taking the privacy out of VPNSIM-swapping 101An audio hack with a “light” touch
When VPNs go public
As many as 2,000 users of the popular VPN service Nord VPN may have had their accounts compromised in a credential stuffing attack.
Credential stuffing refers to the practice …
November 8, 2019 •
8 min read
BlogHigh-profile ransomware attacks on city and state governments have made national and international news in the past year. Many people are left wondering how serious the problem is—and what, if anything, can be done about it.
November 7, 2019 •
4 min read
BlogFree and fair elections are the cornerstone of any democracy. But in recent years, the integrity of the electoral process itself has been called into question.
People across the ideological spectrum are concerned about the political, technological, and social issues around voting: Foreign interference in elections, voter access issues, demonstrably insecure voting machines, and voter fraud. While we may disagree on the details, all of us want secure elections with reliable results.
Blockchain technology has been proposed as a solution to the challenges of modern voting—but many people are unsure about what …
November 5, 2019 •
6 min read
SecurityWe’ve talked about how cybersecurity affects enterprises and schools. But there’s another sector that is increasingly being targeted by cyberattacks: healthcare. The stakes are more than just financial—a cyberattack on a hospital or healthcare facility could literally become a matter of life and death.
In this article we’ll take a look at the state of cybersecurity in the healthcare sector, and detail the unique challenges faced by information security teams working to keep our hospitals safe.
The scope of the problem
The healthcare sector is vast. The US alone has over 6,000 hospitals …
November 4, 2019 •
7 min read
AppleIn recent weeks, several high-profile US organizations have faced controversy due to their ties with China—and due to the actions which they took in order to preserve those ties.
November 3, 2019 •
5 min read
SecurityThis week on the Checklist, we’ll catch you up on what Apple has been doing to keep you safe. We’ll talk about some adware apps that got the boot from the App Store. And finally, we’ll look at the cybersecurity implications of Catholicism 2.0.
This week’s Checklist covers:
A look at the security bits of this week’s Apple updatesAdware violating apps kicked out of the App StoreDo rosary beads really need an app? Really?
To opt in, or to opt out, that is the question…
This week, Apple released a bevy of updates for …
November 1, 2019 •
10 min read
SecurityOn this edition of The Checklist: What to do if you lose the 2FA “thing you have, Privacy concerns behind the wheel, and Who’s who and why you should fear them.
October 24, 2019 •
9 min read