![The Checklist by SecureMac show](https://d3dthqtvwic6y7.cloudfront.net/podcast-covers/000/069/949/medium/the-checklist-by-securemac.jpg)
The Checklist by SecureMac
Summary: SecureMac presents The Checklist. Each week, Ken Ray and August Trometer hit security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
- Visit Website
- RSS
- Artist: SecureMac
- Copyright:
Podcasts:
On this week’s Checklist by SecureMac: - Chrome fights Spectre Attacks with Site Isolation - Developers Reach Into Customer Gmail Bags - USB Restricted Mode: Unrestricted
On this week’s Checklist by SecureMac: - A fake hacker lands in real trouble - Zerodium offers big money for the right zero-day - The fine line between being the “friendly skies” and the creepy skies Don't forget to check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com
News of Note on this week’s Checklist by SecureMac. Topics include: Quick Look’s long look flaw An Apple code signing flaw A host of Apple updates Some fraeky Facebook patents La Liga is listening
It’s summertime! Time to think about security (see also fall, winter, and spring). This week on The Checklist by SecureMac, new stories and follow-ups. Items on the list: - An update on eFail and Apple Mail - Apple changes the game for iOS forensics - More Mac Cryptomining Malware - Major security/privacy improvements in macOS Mojave - Leaks at MyHeritage and TicketFly
Facebook: The security story that keeps on giving. News hit recently that the social network was sharing user info with a host of hardware and software partners without users knowing. We drive into that today, hitting: - How Facebook gave away your data - What data and who’s data was involved - Who got the data and why - Facebook’s response - Some of the implications
Sometimes security is handled well. Other times, it’s handled weakly. Most of today’s list concerns the latter, including: - The Zipperdown vulnerability - Puppy Pictures Preempt Privacy - The returning spectre of Spectre - eFail - What does Apple know about you?
There’s a whole lotta leakin’ goin’ on! On this edition of The Checklist by SecureMac: - The Not Sure Securus Story - Mobile Providers Selling Your Location - LocationSmart Giving Away Location Data - The Unsafe Story of TeenSafe - A Comcast Security SNAFU
It’s like Garanimals up in here: We’re mixing and matching! On this edition of The Checklist by SecureMac: - The Twitter Password List - The Apparent Fall of Cambridge Analytica - Another Facebook Folly - An Update on Equifax - The Disappearing/Reappearing Signals
Big privacy rules changes are upon us. While the new rules will only affect EU citizens, they will change the way online business is done all around the world. On this edition of The Checklist by SecureMac: What is GDPR? What is WHOIS? How does GDPR affect WHOIS? Can ICANN find a solution? Upsides and downsides of the new rules
Routers. You've got 'em, but how much do you really know about them? Is it's password secure? Do you know what the Russians are up to with routers? This episode of the Checklist by SecureMac covers some router basics, some current threats, and what you can do to protect yourself.
This week, The Checklist looks at GrayKey. What is it? How does it work? Is it a good idea? And what is Apple doing about it? Part primer, part philosophical discussion - it’s GrayKey’s Anatomy on this episode of The Checklist by SecureMac.
This week, part two of the Checklist look at an Anatomy of a Data Breach. Topics covered include: - How not to handle a data breach - What companies are doing to protect against data breaches - What companies could do doing better
Lately, dangerous data breaches seem like a daily deal. This week, The Checklist by Secure Mac hits part one of a two part look at the "Anatomy of a Data Breach." On this week's episode: - How data breaches happen - Notable data breaches - What you (personally) can do to minimize the risk of a data breach
With still more revelations around Facebook, it's already time to tackle the topic again. Items on this week's Checklist include: Facebook caught creeping on Android users Digging through your Facebook data An update on the Cambridge Analytica story Mr. Zuckerberg goes to Washington An update on our Machine Learning story
This week, we take an introductory look at machine learning. Topics covered include: What is machine learning? Using machine learning to fight malware How this technology enters our daily lives The creepy side of machine learning Machine learning in the real world: what the future holds