Thursday, July 19, 2018

Apple’s July Security Updates Correct a Host of Problems

It’s that time again: Apple has pushed out a variety of updates for practically all its products, from iTunes for Windows to multiple flavors of macOS, plus the latest version of iOS 11.4. New security updates are also available...

Checklist 97: Privacy Nightmare at 30,000 Feet

In the past, we’ve spent a substantial amount of time talking about the business of security flaws. Usually, it centers around things such as selling personal data on the Dark Web after stealing it using exploits and attacks. Credit...

Episode 96: The Latest Bugs, Flaws, and Privacy Worries

The summer keeps on heating up, so why not stay inside where it’s cool, and relax with the newest edition of The Checklist? As the temperatures outside climb, the headlines in the world of Mac security and beyond keep...

Researcher Discloses Potential Brute Force Attack on iPhone; Apple Says It’s Not Real

A strong passcode is one of the most important elements of personal security on iOS devices. While it has been some time since Apple introduced the stronger six-digit passcodes (which they now recommend), many people continue to use the...

Apple Patches Bug in Swift Programming Language

Apple’s Swift programming language is a useful tool for developers on Mac and iOS platforms due to its versatility and wide-reaching application. Occasionally, though, Apple uncovers issues within Swift that could unintentionally allow bad actors to make inroads towards...

Dummy

Type: Malware Platform: Mac OS X Last updated: 07/02/18 8:57 pm Threat Level: High Description Dummy is malware. Dummy Threat Removal MacScan can detect and remove Dummy Malware from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your...

Checklist 95: Summer Security News

It seems like it was just yesterday that we were kicking off the new year and wondering what the months ahead would have in store for us. As we head into the first sweltering days of summer, it’s safe...

Hackers Could Bypass macOS Signature Checks for A Decade

Code signing is one of the most important lines of defense against malware. It allows a user to know that the software they intend to install or run came from a trusted source, such as Apple, or another trusted...

Apple Patches Xcode to Correct Serious Git Security Flaw

How can programmers keep track of all the changes that get made to a piece of software during its development while keeping everyone else on the project in the loop? Answering that challenge is the purpose of what is...

Checklist 94: Facebook & Friends: More Privacy Concerns

Every week, we try to bring you the biggest news in the security world — or at least the most interesting developments that could affect us all. That’s why this week we’re diving into a brand-new subject we’ve never...

Checklist 93: What’s New in Security News

Welcome to Episode 93 of The Checklist. Today, our attention turns towards security and insecurity — but we’re not talking about a long-lost Jane Austen novel. Instead, we’re taking a tour through the headlines to hit some of the...

ElcomSoft Expands WhatsApp Extraction Capabilities to Business Platform

WhatsApp, the popular messaging app owned by Facebook, is arguably one of the most popular means for secure communication in the world. Facebook says that more than a billion and a half users trade nearly sixty billion messages across...

Checklist 92: Is There a Plumber in the Building?

In many of our recent episodes, we’ve spent plenty of time talking about data breaches, a subject that often dominates security conversations these days. For good, reason, too, as everyone from major credit bureaus such as Equifax to retail...

Career Opportunity: Podcast Host

SecureMac seeks a positive, motivated individual with a willingness to learn and a passion for educating others as an on-air personality and co-host of our podcast, The Checklist by SecureMac. This is a part-time position. The Checklist, hosted by...

Checklist 91 – Mix and Match 3.0

The 2018 parade of big tech and security headlines continues, and in recent episodes, we’ve touched on some pretty big developments. From Cambridge Analytica and Facebook scandals to the rollout of the General Data Protection Regulation in Europe, we’ve...

Okta Acquires Access Control Startup ScaleFT

Enterprise identity management firm Okta this week announced that it has acquired ScaleFT, a company that offers a Zero Trust access control platform. read more

Suing South Carolina Because Its Election Machines Are Insecure

A group called Protect Democracy is suing South Carolina because its insecure voting machines are effectively denying people the right to vote. Note: I am an advisor to Protect Democracy on its work related to election cybersecurity, and submitted a...

Why the Best Defense Is a Good Offensive Security Strategy

When many people think about offensive security, they picture a mysterious figure wearing a hoodie, sitting behind a black-and-green terminal, diligently typing away as he probes enterprise networks. But the cybersecurity world has evolved well beyond this Hollywood hacker...

Google hit with $5.1b fine in EU’s Android antitrust case

This could mean the end of free Android. In the meantime, Google plans to appeal.

Privacy Advocates Say Kelsey Smith Act Gives Police Too Much Power

This bill making its way through Congress would allow law enforcement to more easily uncover location data for cell phones from mobile carriers in an emergency.