Apple AirDrop Vulnerability Broadcasts User Phone Numbers to Potential Attackers

Apple AirDrop Vulnerability Broadcasts User Phone Numbers to Potential Attackers

iPhone users who frequently use the AirDrop feature to share images, videos, or other files may unwittingly be broadcasting their phone numbers to people nearby. According to a recent Ars Technica report, a hacker would need to have a laptop and a “wireless packet sniffer” dongle to exploit the vulnerability. Armed with those components, a security researcher testing the proof-of-concept software designed to exploit the vulnerability was able to see “details of more than a dozen iPhones and Apple Watches that were within radio range” and use this information to …

August 24, 2019 • 3 min read
Checklist 151: Too Close for Security Comfort

Checklist 151: Too Close for Security Comfort

This week on the Checklist podcast, we’ll talk about how to deal with security risks that come from those closest to you (literally). We’ll take you through some bad iOS news from the past week, and also discuss how it relates to a larger issue related to mobile security. And finally, we revisit a familiar topic—passwords—and tell you about some newly released Google research that probably means we’ll have to keep talking about passwords for the foreseeable future. Here’s our weekly Checklist:

Protecting your data from the people – literally – …

August 22, 2019 • 12 min read
Careers In Cybersecurity

Careers In Cybersecurity

In the first part of this two-part series, we made the case for cybersecurity as a career path with excellent short and long-term growth prospects.

But what, exactly, do folks who work in cybersecurity do all day?

That’s what we’ll cover in this article. 

While the list of jobs won’t be exhaustive—cybersecurity, like any complex and growing field, has a wide array of opportunities—it will cover some of the most in-demand specializations and give a representative sampling of the kinds of jobs out there (along with a general idea of how much they …

August 19, 2019 • 4 min read
Should you post pictures of your kids on social media?

Should you post pictures of your kids on social media?

Parents are proud of their kids, and it’s natural to want to share special moments from their lives with friends and family on social media. But a growing chorus of experts is warning that sharing too much of our children’s private lives can do real harm.

What you decide to put on social media is a personal decision…but it should be an informed decision. Here are five things to consider before posting those baby bathtime photos—along with some tips to protect your children’s privacy and help keep them safe.

article span.backnum { …

August 14, 2019 • 5 min read
Sign in with Apple: Digital privacy at last?

Sign in with Apple: Digital privacy at last?

At this year’s Worldwide Developers Conference, Apple announced several forthcoming changes aimed at improving privacy and security for its users. Perhaps the most important of these was “Sign in with Apple”, slated for widespread release later this year.

In this post, we’ll talk about what Sign in with Apple is, why it matters…and whether or not it’s all it’s cracked up to be.

What is Sign in with Apple?

Many apps ask users to sign-in with a social media account, ostensibly in order to offer a more personalized experience. You’ve probably seen or …

August 14, 2019 • 4 min read
Are Cybersecurity Skills In Demand?

Are Cybersecurity Skills In Demand?

As millions of students head back to university this fall, a substantial chunk of them will do so without knowing what they’re actually going to end up studying.

For most undeclared majors, the final decision is going to come down to career prospects: whether or not they’ll be able to find a job after graduation.

Of course, nobody knows exactly what the economy is going to be doing (or not doing) in four years, but the best hedge against uncertainty has always been to figure out what skills are in demand—and learn …

August 12, 2019 • 3 min read
Black Hat 2019: Apple’s $1 million prize, new vulnerabilities revealed, and a keynote to remember

Black Hat 2019: Apple’s $1 million prize, new vulnerabilities revealed, and a keynote to remember

The 22nd annual Black Hat USA conference was held this week in Las Vegas. Black Hat is one of the most important events in cybersecurity, bringing together researchers, developers, and hackers from all over the world for a week of training sessions and briefings. As such, it’s often the stage for major announcements affecting security professionals as well as the general public.

This year’s Black Hat did not disappoint, and featured significant new developments that will interest both macOS and iOS users.

Read on for our roundup of Black Hat 2019…

The macOS …

August 9, 2019 • 4 min read
Checklist 149: Security Tripping with The Checklist

Checklist 149: Security Tripping with The Checklist

This week, we say hello to August with a groan as news of more big data breaches that could affect our financial lives comes out. Then we’ll pivot to talk about how you can stay safe when you squeeze in one last summer vacation before autumn arrives, and we’ll round things out with a follow-up to a follow-up. It’s in the name of the show — so here’s this week’s checklist of stories:

The Bad/Worse Breach7 Tips for TripsA Stronger Little Snitch

Let’s not waste any time as we embark on a …

August 8, 2019 • 10 min read
The DataSpii Privacy Disaster: How Browser Extensions Resulted in a Huge Sensitive Data Leak

The DataSpii Privacy Disaster: How Browser Extensions Resulted in a Huge Sensitive Data Leak

If you use Google Chrome or Mozilla Firefox as your go-to web browser, and you regularly make use of browser extensions, then some of your browsing data may have been compromised. According to a detailed Ars Technica report on the matter—which is being referred to as “DataSpii’—more than four million users have likely been affected. 

The fault lies with eight different browser extensions, meant for everything from getting past paywalls to zooming in on web content. The way these extensions were set up allowed them to access and collect a wide …

August 3, 2019 • 3 min read