Encrypted messaging apps: Everything you need to know

Encrypted messaging apps: Everything you need to know

Privacy is hard to come by these days. Malicious actors, large corporations, and governments are constantly trying to look over your shoulder when you’re online.

But some in the tech community are fighting back. Tools like ad blockers, no-track browsers, and VPNs can help keep digital snoops in check. 

One of the most important of these technologies is encrypted messaging, which is available through a number of third-party and native applications.

So how do these messengers work? Are they all the same? And the million dollar question: Are they truly secure? Here’s what …

November 13, 2019 • 8 min read
The SecureMac Interview: Security Researcher Patrick Wardle talks nation-state malware and the future of macOS

The SecureMac Interview: Security Researcher Patrick Wardle talks nation-state malware and the future of macOS

Patrick Wardle is a security researcher and software developer whose areas of expertise include macOS malware and nation-state threats.

Wardle is Principal Security Researcher at Jamf and creator of the Objective-See suite of security tools. He is also the founder of the world’s premier Mac security conference: Objective by the Sea.

We caught up with Patrick to talk about macOS security as well as the advanced threats being created by nation-state actors around the world.

CNN once called Patrick Wardle “a sweet guy” who could “hack …

November 12, 2019 • 24 min read
Digital forensics and privacy: 3 things to know

Digital forensics and privacy: 3 things to know

Digital forensic analysts are the Sherlocks of cybersecurity, gathering and interpreting evidence from digital sources for use in criminal or civil court cases. While the field of digital forensics is an interesting topic in its own right, it’s also worth learning about if you’re interested in digital privacy issues. 

Understanding how digital forensic analysts work—and in particular, what they look for in their investigations—can teach you a lot about what’s going on behind the scenes on your computer. And once you know that, you can take steps to better protect your …

November 11, 2019 • 8 min read
Checklist 162: Insecurity with a “light” touch

Checklist 162: Insecurity with a “light” touch

On this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out of a Hollywood thriller.

Here’s the Checklist for this week:

Taking the privacy out of VPNSIM-swapping 101An audio hack with a “light” touch

When VPNs go public

As many as 2,000 users of the popular VPN service Nord VPN may have had their accounts compromised in a credential stuffing attack.

Credential stuffing refers to the practice …

November 8, 2019 • 8 min read
7 Facts About Ransomware Attacks on Local Government

7 Facts About Ransomware Attacks on Local Government

High-profile ransomware attacks on city and state governments have made national and international news in the past year. Many people are left wondering how serious the problem is—and what, if anything, can be done about it.

November 7, 2019 • 4 min read
5 Things to Know About Blockchain Voting

5 Things to Know About Blockchain Voting

Free and fair elections are the cornerstone of any democracy. But in recent years, the integrity of the electoral process itself has been called into question.

People across the ideological spectrum are concerned about the political, technological, and social issues around voting: Foreign interference in elections, voter access issues, demonstrably insecure voting machines, and voter fraud. While we may disagree on the details, all of us want secure elections with reliable results.

Blockchain technology has been proposed as a solution to the challenges of modern voting—but many people are unsure about what …

November 5, 2019 • 6 min read
Cybersecurity and healthcare: When infosec is a matter of life and death

Cybersecurity and healthcare: When infosec is a matter of life and death

We’ve talked about how cybersecurity affects enterprises and schools. But there’s another sector that is increasingly being targeted by cyberattacks: healthcare. The stakes are more than just financial—a cyberattack on a hospital or healthcare facility could literally become a matter of life and death.

In this article we’ll take a look at the state of cybersecurity in the healthcare sector, and detail the unique challenges faced by information security teams working to keep our hospitals safe.

The scope of the problem

The healthcare sector is vast. The US alone has over 6,000 hospitals …

November 4, 2019 • 7 min read
Apple’s China Problem

Apple’s China Problem

In recent weeks, several high-profile US organizations have faced controversy due to their ties with China—and due to the actions which they took in order to preserve those ties.

November 3, 2019 • 5 min read
Checklist 161: The Fixes Are In (Again)

Checklist 161: The Fixes Are In (Again)

This week on the Checklist, we’ll catch you up on what Apple has been doing to keep you safe. We’ll talk about some adware apps that got the boot from the App Store. And finally, we’ll look at the cybersecurity implications of Catholicism 2.0.

This week’s Checklist covers:

A look at the security bits of this week’s Apple updatesAdware violating apps kicked out of the App StoreDo rosary beads really need an app? Really?

To opt in, or to opt out, that is the question…

This week, Apple released a bevy of updates for …

November 1, 2019 • 10 min read
The SecureMac Interview: Nancy Willard on Cyberbullying

The SecureMac Interview: Nancy Willard on Cyberbullying

Nancy Willard is an educator and lawyer who runs Embrace Civility in the Digital Age, an organization dedicated to creating a culture of civility and positivity online through empowering teens and the adults who care for them. She is the author of several books, including the first book ever published on the topic of cyberbullying, Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Cruelty, Threats, and Distress.

SecureMac caught up with Nancy to ask her about the state of cyberbullying today, and what parents and …

October 23, 2019 • 8 min read
Checklist 159: What That and Tencent Will Get You

Checklist 159: What That and Tencent Will Get You

This week on the Checklist, we’ll look at a troubling connection between Apple and the Chinese government. We’ll revisit the issue of IoT security (spoiler: It’s not getting any safer out there). And we’ll round out the list with a reminder that when it comes to cybersecurity, sharing is caring!

This week’s Checklist is: 

What Website Warnings and Tencent will get youSecurity and an Internet of Things thingAnd would you please join our street team? We offer benefits! 

Apple’s silent partner

Last week MacRumors reported on a connection between Apple and Chinese tech giant …

October 18, 2019 • 8 min read