This week, we're looking at ways kids are targeted through technology and what we can do to help them not fall victim. Items on the list:
- Chat and Social Media
- Privacy and Security in Apps
- Online Games
- Is Monitoring Software Right for Your Family?
- Keeping Open Lines of Communication
Don't forget to check out our show notes:
SecureMac.com/Checklist
And send us an email:
Checklist@Securemac.com
On part two of security features built into iOS 11, the guys from SecureMac tackle:
- Improved tracking protection
- Improved photo privacy
- A questionable change to Control Center
Be sure to check out our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This is part one of our two part look at security features built into iOS 11. Today's list includes:
- Face ID
- Protection against unauthorized backups
- Physical protection features
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, we go back to the Mac - specifically, the security features Apple has built into macOS.
Go over them all yourself with our show notes:
SecureMac.com/Checklist
And do, please, send us an email:
Checklist@SecureMac.com
As we head into the holidays, The Checklist looks at buying safe connected devices and keeping those devices secure.
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
Last week, we talked about talking to our parents about security. This week, we're giving their machines a checkup ourselves. What should you look for? Listen and find out.
Check out our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
It's time for "The Talk 2.0." That's the one where you chat with your folks about the facts of living a secure life online. This week, it's quick primers on:
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
Do you understand blockchain? Ken does not. Thank goodness Nicholas and Nicholas are here! Learn along with Ken, won't you?
Be sure to check our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week on the Checklist, we take on some of your questions and comments. Topics include:
We'd love to add your questions and comments to future shows! Send them to Checklist@SecureMac.com
And check out our show notes at SecureMac.com/Checklist
This week, we're tackling threats to your online privacy as well as online threats to your physical privacy.
Be sure to check out the Checklist show notes:
SecureMac.com/Checkllist
And send us an email:
Checklist@SecureMac.com
We know HTTPS is safer than HTTP, but do we know why? Ken doesn't. Luckily, Nicholas and Nicholas are here to help. Listen and learn along with Ken!
Got a topic you want us to hit? Send it in!
And be sure to check our show notes:
We all know that lax security around IoT devices can lead to bad things. But do we know why or how? How can a smart toaster end up as part of a botnet? How can a smart fridge send spam? On today's show: How Many Lightbulbs Does it Take to Change the Internet?
Do you have a security truism you'd like to understand? Tell us what it is! Checklist@SecureMac.com
And be sure to check our show notes: SecureMac.com/Checklist
This week on The Checklist by SecureMac: All About Botnets!
- Why are they made?
- How do they start?
- What can we do to fight them?
Find out on this week's show. Then, dig deeper with our show notes:
SecureMac.com/Checklist
Have a topic you want us to hit? Send us an email:
Checklist@SecureMac.com
This week, Nicholas, Nicholas, and Ken look at five of the world's biggest hacks (or five of the biggest about which we know, anyway).
Check out notes for the show: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, Nicholas, Nicholas, and Ken take a look at healthcare in the digital age. Why did medicine go digital? What are the dangers? And what can we do to protect ourselves going forward?
Check out notes from this show and past shows:
And send us an email!
This week, Nicholas, Nicholas, and Ken take a look at AI devices and security.
Find more content in our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
Today on the Checklist - a look at spyware: what it does, where it comes from, and how you can fight it.
Check out our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, the guys look at identity theft - what it is, how to prevent it, and what do do if your identity is stolen.
Show notes wait for you! SecureMac.com/Checklist
And we'd love to hear your feedback! Checklist@SecureMac.com
This week, Nicholas, Nicholas and Ken take a brief look at the history of malware for both PC and Mac.
Learn more with our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
Social Engineering: What is it? How does it happen? Who needs to worry about it? We'll hit those topics and more on this week's Checklist by SecureMac.
Dig deeper with our show notes: SecureMac.com/Checklist
And drop us a line: Checklist@SecureMac.com
This week we take a look at the recent history and current state of encryption
Go in depth with our show notes: SecureMac.com/Checklist
And send us an email: Checklist@SecureMac.com
This week, a look at spam - not the mystery meat (that's SPAM) - but the phony emails promising health, wealth, physical prowess and more! Why is it called spam? Where does it come from? Why does it keep coming? We'll look at those questions and what you can do about them on this week's Checklist!
Show notes are always waiting for you at SecureMac.com/Checklist
Our inbox is always open - Checklist@SecureMac.com
This week, we look at the Internet of Things:
- What is it?
- What are the risks around it?
- What is the future of these devices?
Be sure to check out the Checklist show notes:
SecureMac.com/Checklist
And drop us a line:
Checklist@SecureMac.com
This week, we look at the differences between authentication and authorization, how much of which you need, and with will get you further with the other. Sound confusing? Just you wait... for episode 041 of The Checklist!
Be sure to scope our show notes: Securemac.com/Checklist
And send us an email: Checklist@Securemac.com
On this WWDC week Checklist, we take a look at Apple's hacker history and where that spirit survives today.
Check out the Checklist show notes: SecureMac.com/Checklist
And get in touch with us: Checklist@SecureMac.com