This week, we're looking at ways kids are targeted through technology and what we can do to help them not fall victim. Items on the list:
- Chat and Social Media
- Privacy and Security in Apps
- Online Games
- Is Monitoring Software Right for Your Family?
- Keeping Open Lines of Communication
Don't forget to check out our show notes:
SecureMac.com/Checklist
And send us an email:
Checklist@Securemac.com
This week, we look at ways the elderly are targeted by scammers. Topics include:
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
On part two of security features built into iOS 11, the guys from SecureMac tackle:
- Improved tracking protection
- Improved photo privacy
- A questionable change to Control Center
Be sure to check out our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This is part one of our two part look at security features built into iOS 11. Today's list includes:
- Face ID
- Protection against unauthorized backups
- Physical protection features
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, we go back to the Mac - specifically, the security features Apple has built into macOS.
Go over them all yourself with our show notes:
SecureMac.com/Checklist
And do, please, send us an email:
Checklist@SecureMac.com
As we head into the holidays, The Checklist looks at buying safe connected devices and keeping those devices secure.
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
Last week, we talked about talking to our parents about security. This week, we're giving their machines a checkup ourselves. What should you look for? Listen and find out.
Check out our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
It's time for "The Talk 2.0." That's the one where you chat with your folks about the facts of living a secure life online. This week, it's quick primers on:
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, we're looking at Apple's App Stores for macOS and iOS. Specifically, what happens when malware and vulnerabilities are found? Find out on this week's show!
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, we’re looking at Apple’s App Stores for macOS and iOS.
Be sure to check out our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
Do you understand blockchain? Ken does not. Thank goodness Nicholas and Nicholas are here! Learn along with Ken, won't you?
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week on the Checklist, we take on some of your questions and comments. Topics include:
We'd love to add your questions and comments to future shows! Send them to Checklist@SecureMac.com
And check out our show notes at SecureMac.com/Checklist
This week on the Checklist, we take on some of your questions and comments.
Topics include:
We'd love to add your questions and comments to future shows! Send them to Checklist@SecureMac.com
And check out our show notes at SecureMac.com/Checklist
This week, we're tackling threats to your online privacy as well as online threats to your physical privacy.
Be sure to check out the Checklist show notes:
SecureMac.com/Checkllist
And send us an email:
Checklist@SecureMac.com
We know HTTPS is safer than HTTP, but do we know why? Ken doesn't. Luckily, Nicholas and Nicholas are here to help. Listen and learn along with Ken!
Got a topic you want us to hit? Send it in!
And be sure to check our show notes:
The personal information of 143-million people may have been compromised when the consumer credit reporting agency Equifax was hacked. What do we know about the attack? And what can we do going forward? These are the questions we're tackling on this week's Checklist.
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
We all know that lax security around IoT devices can lead to bad things. But do we know why or how? How can a smart toaster end up as part of a botnet? How can a smart fridge send spam? On today's show: How Many Lightbulbs Does it Take to Change the Internet?
Do you have a security truism you'd like to understand? Tell us what it is! Checklist@SecureMac.com
And be sure to check our show notes: SecureMac.com/Checklist
This week on The Checklist by SecureMac: All About Botnets!
- Why are they made?
- How do they start?
- What can we do to fight them?
Find out on this week's show. Then, dig deeper with our show notes:
SecureMac.com/Checklist
Have a topic you want us to hit? Send us an email:
Checklist@SecureMac.com
This week, Nicholas, Nicholas, and Ken look at five of the world's biggest hacks (or five of the biggest about which we know, anyway).
Check out notes for the show: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, Nicholas, Nicholas, and Ken take a look at healthcare in the digital age. Why did medicine go digital? What are the dangers? And what can we do to protect ourselves going forward?
Check out notes from this show and past shows:
And send us an email!
This week, Nicholas, Nicholas, and Ken take a look at AI devices and security.
Find more content in our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
Today on the Checklist - a look at spyware: what it does, where it comes from, and how you can fight it.
Check out our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, the guys look at identity theft - what it is, how to prevent it, and what do do if your identity is stolen.
Show notes wait for you! SecureMac.com/Checklist
And we'd love to hear your feedback! Checklist@SecureMac.com
This week, Nicholas, Nicholas and Ken take a brief look at the history of malware for both PC and Mac.
Learn more with our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
Social Engineering: What is it? How does it happen? Who needs to worry about it? We'll hit those topics and more on this week's Checklist by SecureMac.
Dig deeper with our show notes: SecureMac.com/Checklist
And drop us a line: Checklist@SecureMac.com