Wednesday, December 11, 2019

Checklist 166: Warnings from the FUN Bureau

On this week’s Checklist, we’ll look at some dumb ways to buy a smartwatch. We’ll share a PSA from the FBI. And we’ll talk politics and app security by way of FaceApp. The post Checklist 166: Warnings from the FUN...

Setting up a new Mac for security: 7 tips and tricks

So you’re the proud owner of a brand new Mac — wonderful! You’re no doubt eager to try out all the bells and whistles; install your favorite apps; start using your new machine. We know the feeling. But part of setting...

Checklist 165: Safe shopping for the holidays

This week’s Checklist gets you ready for the seasonal shopping rush (from a cybersecurity perspective, anyway). We’ll show you how to keep safe as you shop online; what gifts you might want to avoid; and how to make sure...

10 ways to avoid Black Friday and Cyber Monday scams in 2019

The holiday shopping season is almost here, and many of us are gearing up for the big sales that go with it. In particular, Black Friday and Cyber Monday are sure to be two of the busiest shopping days...

Checklist 164: Over the River and Through the Woods

A a complete guide to how to keep yourself safe during the holiday travel season. We’ll tell you what to do before you even walk out the door, how to protect yourself while you’re traveling, and what things to...

5 Airbnb security and privacy tips

Holiday travel season is almost here. And while many of us will be staying with family, friends, or in hotels, a growing number of people are making use of Airbnb to find lodging during the holidays. Airbnb rentals can be...

SecureMac’s Holiday Travel Survival Guide

The holidays mean lots of company in and out, and travel. Follow these simple 10 tips to harden your security and keep your privacy this holiday season. The post SecureMac’s Holiday Travel Survival Guide appeared first on SecureMac.

Checklist 163: Encryption Minus the Encryption

On this edition of The Checklist: Apple Mail Encryption, Now with Less Encryption!, Ransomware Revisited, and A Ring of Insecurity. The post Checklist 163: Encryption Minus the Encryption appeared first on SecureMac.

The SecureMac Interview: Security Researcher Patrick Wardle talks nation-state malware and the future of macOS

Patrick Wardle is a security researcher and software developer whose areas of expertise include macOS malware and nation-state threats. Wardle is Principal Security Researcher at Jamf and creator of the Objective-See suite of security tools. He is also the...

Digital forensics and privacy: 3 things to know

Digital forensic analysts are the Sherlocks of cybersecurity, gathering and interpreting evidence from digital sources for use in criminal or civil court cases. While the field of digital forensics is an interesting topic in its own right, it’s also...

Encrypted messaging apps: Everything you need to know

Privacy is hard to come by these days. Malicious actors, large corporations, and governments are constantly trying to look over your shoulder when you’re online. But some in the tech community are fighting back. Tools like ad blockers, no-track browsers,...

Checklist 162: Insecurity with a “light” touch

On this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out...

7 Facts About Ransomware Attacks on Local Government

High-profile ransomware attacks on city and state governments have made national and international news in the past year. Many people are left wondering how serious the problem is—and what, if anything, can be done about it. The post 7...

5 Things to Know About Blockchain Voting

Free and fair elections are the cornerstone of any democracy. But in recent years, the integrity of the electoral process itself has been called into question. People across the ideological spectrum are concerned about the political, technological, and social issues...

Cybersecurity and healthcare: When infosec is a matter of life and death

We’ve talked about how cybersecurity affects enterprises and schools. But there’s another sector that is increasingly being targeted by cyberattacks: healthcare. The stakes are more than just financial—a cyberattack on a hospital or healthcare facility could literally become a...
SC Magazine

Pensacola confirms ransomware attack

Pensacola officials confirmed that an ongoing cyberattack that began early Saturday morning is a ransomware attack. While the city did not release any additional details, the Pensacola News Journal said city spokeswoman Kaycee Lagarde confirmed the attack included a ransom, something that...

Trickbot Operators Now Selling Attack Tools to APT Actors

North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.
Brian Krebs

The Great $50M African IP Address Heist

A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions...

Intel Issues Fix for ‘Plundervolt’ SGX Flaw

Researchers were able to extract AES encryption key using SGX's voltage-tuning function.

How to stop spam calls right now

Spam calls drive us all crazy. Here are four ways to stop robocalls and other unsolicited phone calls.