The Checklist by SecureMac show

The Checklist by SecureMac

Summary: SecureMac presents The Checklist. Each week, Ken Ray and August Trometer hit security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!

Podcasts:

 Checklist 98 - Great (and Not So Great) Googley Moogley! | File Type: audio/mpeg | Duration: 34:56

On this week’s Checklist by SecureMac: - Chrome fights Spectre Attacks with Site Isolation - Developers Reach Into Customer Gmail Bags - USB Restricted Mode: Unrestricted

 Checklist 97 - Privacy Nightmare at 30,000 Feet | File Type: audio/mpeg | Duration: 26:37

On this week’s Checklist by SecureMac: - A fake hacker lands in real trouble - Zerodium offers big money for the right zero-day - The fine line between being the “friendly skies” and the creepy skies Don't forget to check out our show notes:  SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com

 Checklist 96 - News of Note | File Type: audio/mpeg | Duration: 50:52

News of Note on this week’s Checklist by SecureMac. Topics include: Quick Look’s long look flaw An Apple code signing flaw A host of Apple updates Some fraeky Facebook patents La Liga is listening

 Checklist 95 - Summer Security Roundup | File Type: audio/mpeg | Duration: 28:24

It’s summertime! Time to think about security (see also fall, winter, and spring). This week on The Checklist by SecureMac, new stories and follow-ups. Items on the list:  - An update on eFail and Apple Mail  - Apple changes the game for iOS forensics - More Mac Cryptomining Malware - Major security/privacy improvements in macOS Mojave - Leaks at MyHeritage and TicketFly

 Checklist 94 - Again with the Facebook | File Type: audio/mpeg | Duration: 24:30

Facebook: The security story that keeps on giving. News hit recently that the social network was sharing user info with a host of hardware and software partners without users knowing. We drive into that today, hitting:  - How Facebook gave away your data - What data and who’s data was involved - Who got the data and why - Facebook’s response - Some of the implications

 Checklist 93 - Weakly Security Update | File Type: audio/mpeg | Duration: 29:51

Sometimes security is handled well. Other times, it’s handled weakly. Most of today’s list concerns the latter, including: - The Zipperdown vulnerability  - Puppy Pictures Preempt Privacy  - The returning spectre of Spectre  - eFail - What does Apple know about you? 

 Checklist 92 - Lots and Lots of Leaks | File Type: audio/mpeg | Duration: 22:57

There’s a whole lotta leakin’ goin’ on! On this edition of The Checklist by SecureMac: - The Not Sure Securus Story - Mobile Providers Selling Your Location - LocationSmart Giving Away Location Data - The Unsafe Story of TeenSafe - A Comcast Security SNAFU

 Checklist 91 - Mix and Match 3 | File Type: audio/mpeg | Duration: 25:22

It’s like Garanimals up in here: We’re mixing and matching! On this edition of The Checklist by SecureMac: - The Twitter Password List - The Apparent Fall of Cambridge Analytica - Another Facebook Folly - An Update on Equifax - The Disappearing/Reappearing Signals

 Checklist 90 - WHOIS GDPR? | File Type: audio/mpeg | Duration: 23:57

Big privacy rules changes are upon us. While the new rules will only affect EU citizens, they will change the way online business is done all around the world. On this edition of The Checklist by SecureMac: What is GDPR? What is WHOIS? How does GDPR affect WHOIS? Can ICANN find a solution? Upsides and downsides of the new rules

 Checklist 89 - Router Rundown | File Type: audio/mpeg | Duration: 22:59

Routers. You've got 'em, but how much do you really know about them? Is it's password secure? Do you know what the Russians are up to with routers? This episode of the Checklist by SecureMac covers some router basics, some current threats, and what you can do to protect yourself.

 Checklist 88 - GrayKey's Anatomy | File Type: audio/mpeg | Duration: 23:33

This week, The Checklist looks at GrayKey. What is it? How does it work? Is it a good idea? And what is Apple doing about it? Part primer, part philosophical discussion - it’s GrayKey’s Anatomy on this episode of The Checklist by SecureMac.

 Checklist 087 - Anatomy of a Data Breach - Part 2 | File Type: audio/mpeg | Duration: 18:28

This week, part two of the Checklist look at an Anatomy of a Data Breach. Topics covered include: - How not to handle a data breach - What companies are doing to protect against data breaches - What companies could do doing better

 Checklist 086 - Anatomy of a Data Breach - Part 1 | File Type: audio/mpeg | Duration: 25:36

Lately, dangerous data breaches seem like a daily deal. This week, The Checklist by Secure Mac hits part one of a two part look at the "Anatomy of a Data Breach." On this week's episode: - How data breaches happen - Notable data breaches - What you (personally) can do to minimize the risk of a data breach 


 Checklist 085 - Facebook Follies | File Type: audio/mpeg | Duration: 32:56

With still more revelations around Facebook, it's already time to tackle the topic again. Items on this week's Checklist include: Facebook caught creeping on Android users Digging through your Facebook data An update on the Cambridge Analytica story Mr. Zuckerberg goes to Washington An update on our Machine Learning story

 Checklist 084 - Machine Learning 101 | File Type: audio/mpeg | Duration: 15:28

This week, we take an introductory look at machine learning. Topics covered include: What is machine learning? Using machine learning to fight malware How this technology enters our daily lives The creepy side of machine learning Machine learning in the real world: what the future holds

Comments

Login or signup comment.