What is key-based 2FA?

What is key-based 2FA?

Standard 2FA has some important limitations, which is why many security experts believe that key-based 2FA is the wave of the future — especially now that Apple has made changes to make it much more accessible to iPhone and iPad users.

July 31, 2020 • 6 min read
Checklist 192: Twitter Hack 2020

Checklist 192: Twitter Hack 2020

A week behind us, the great Twitter hack is still unfolding. We’ll look at what we think we know so far and why the hack itself matters on this edition of The Checklist, brought to you by SecureMac.

July 23, 2020 • 6 min read
Twitter hack was an inside job, sources say

Twitter hack was an inside job, sources say

On Wednesday, multiple verified, high-profile Twitter accounts were compromised, including the accounts of Barack Obama, Elon Musk, and Apple. Hackers made tweets requesting charitable donations in the form of Bitcoin, promising to double any contribution made within the next 30 minutes. The tweets were, of course, fraudulent — and the Bitcoin wallet addresses set up to accept the cryptocurrency “donations” belonged to the scammers.

Twitter reacted quickly to the attack, removing the offending tweets, locking down affected accounts, and preventing users from tweeting or resetting their passwords as the company attempted …

July 16, 2020 • 2 min read
EARN IT Act moves forward, worrying privacy advocates

EARN IT Act moves forward, worrying privacy advocates

The “EARN IT” Act is slowly making its way through the U.S. Senate. Despite strong public criticism, an amended version of the bill was unanimously approved by the Senate Judiciary Committee in early July, setting the stage for full hearings in the near future.

In this article, we’ll discuss the background to EARN IT, and let you know why some people say it’s a serious threat to free speech and digital privacy.

What is EARN IT?

EARN IT (Eliminating Abusive and Rampant Neglect of Interactive Technologies) is the name of a bill currently …

July 15, 2020 • 4 min read
Is Mac malware evolving?

Is Mac malware evolving?

Mac malware is increasing in quantity, and many security researchers say it’s becoming more sophisticated as well. While some Mac users are still a bit blasé about the threats facing the platform, the last few weeks have provided two great examples of the evolution of Mac malware. In what follows, we’ll fill you in on the details, and offer some thoughts about what it all means for the future of macOS security.

Old malware, new delivery method

Security researchers at Intego recently spotted what seemed to be a new variant of Mac …

July 13, 2020 • 5 min read
Browser extensions and your privacy

Browser extensions and your privacy

afari is getting a major overhaul in macOS 11 Big Sur, and one of the most important privacy enhancements has to do with browser extensions

July 8, 2020 • 8 min read
10 tips for getting back on the road again

10 tips for getting back on the road again

Covid-19 lockdowns are starting to lift, and people are already beginning to travel for work and family reasons. We’ve shared cybersecurity best practices for travel before, but this year, there are some pandemic-related considerations to add to the list. 

Here, then, are 10 things to keep in mind if you’re going to be hitting the road in the coming months (starting with five “new normal” additions to the usual advice, and rounding things out with five always-relevant tips for secure travel).

article span.backnum { font-family:”Open Sans”, sans-serif; font-size: 10rem; opacity: 0.3; line-height: …

June 18, 2020 • 5 min read
Security for new high school grads

Security for new high school grads

It’s high school graduation time again! COVID-19 has brought some big changes this year, with drive-thru graduations and Zoom commencement speeches taking the place of traditional ceremonies. But despite the differences, one thing is guaranteed to remain the same: The bad guys will be targeting new grads for fraud, scams, and identity theft.

If you know a member of the Class of 2020, here are three things you can do to help keep them safe.

article span.backnum { font-family:”Open Sans”, sans-serif; font-size: 10rem; opacity: 0.3; line-height: 1; position:absolute; left: 1rem; top: 0;}
article …

June 17, 2020 • 5 min read
Karen Gullo on government monitoring

Karen Gullo on government monitoring

Karen Gullo is an analyst and senior media relations specialist for Electronic Frontier Foundation (EFF). She is an award-winning journalist who has written for both The Associated Press and Bloomberg News. Her writing has focused on the intersection of law, politics, and technology. In her current role, Gullo supports EFF’s mission of defending civil liberties and enhancing rights in the digital world.

If you would like to learn more about Karen and her work, you can follow her on Twitter or read her past articles and blog …

June 16, 2020 • 10 min read
What is Tor?

What is Tor?

We’ll answer some common questions we’ve heard about Tor — touching on issues of functionality, safety, and privacy.

June 10, 2020 • 12 min read
What is a DNS leak?

What is a DNS leak?

A security flaw known as a “DNS leak” that can reveal all of your web activity to your ISP — even if you’re using a VPN!

June 9, 2020 • 4 min read