Feedback & Followups Listener and community feedback, developments in recently covered stories, and developments in long-running stories we’re tracking over time. 🇨🇳 More details continue to emerge of just how deeply the Chinese government infiltrated the West’s telecommunications networks – it’s not just a few US carriers, it’s carriers in “dozens of countries”, and even […]
Continue readingTag: encryption
Security Bits — 17 October 2021
Feedback & Followups Listener and community feedback, developments in recently covered stories, and developments in long-running stories we’re tracking over time. Another example of 2FA-bypass attacks in use in the wild: How Coinbase Phishers Steal One-Time Passwords – Krebs on Security — krebsonsecurity.com/… 🇪🇺 Pegasus Project: European Parliament awards journalism prize to investigation of use […]
Continue readingEncrypted Off-Site Backups with Synology Hyper Backup
Synology 5-Bay DS1520+ $700 Without Disks on Amazon Synology – Not Just a Bunch of Disks When people look at the pricing of a Synology, the sticker shock is really shocking. I think there’s a couple of reasons why. The enclosures themselves are expensive. Filling the enclosures with drives is very expensive because you have […]
Continue readingSecurity Bits — 26 June 2020
Feedback & Followups Listener and community feedback, developments in recently covered stories, and developments in long-running stories we’re tracking over time. Zoom says it’ll provide end-to-end encryption even for free users now — thenextweb.com/… COVID Exposure Notification/Contact Tracing Apps continue to be developed around the world with continued varying levels of success: Amnesty International warn […]
Continue readingSecurity Bits — 26 January 2020
Feedback & Followups Following on from Apple’s introduction of support for FIDO2 in iOS 13, Google now allow you to use an iPhone as a hardware security token — nakedsecurity.sophos.com/… 🇺🇸 Following on from YouTube’s recent $170 million fine for breaching COPPA, a bi-partisan bill has been introduced in the US House of Representatives named […]
Continue readingDumb Question Corner – Security of Password-Protected iWork Documents
Gordon sent in a terrific Dumb Question for us a while ago and I’m finally going to answer him: Hi Allison – I have a question. You might say I have a dumb question. I wanted to know if password securing your documents is, well, secure. In my case I have a spreadsheet in Numbers […]
Continue readingDorothy’s Process to Search for the Best Secure Email Service
Intro Hello, NosillaCastaways. This is macLurker, also known as Dorothy, Allison’s gym buddy. For a long time, I have been wanting to change my primary email service & name. I’ve had it for years and years. It’s long since been sold into the dark web. It’s time to wipe the slate clean and start over. […]
Continue readingSecurity Bits – 25 July 2019
Followups The Zoom webcam/webserver issue We now have confirmation that the vulnerability was also present in the RingCentral and Zhumu apps — www.imore.com/… Apple have rolled out an additional automatic security update to address the issues with these apps — www.macobserver.com/… Related Opinion: John Gruber addresses the question Isn’t [Apple’s response] “nonconsensual technology” too? in […]
Continue readingSecurity Bits – 14 December 2018
Followup Bloomberg’s controversial The Big Hack story SuperMicro released the results of an independent audit which found no evidence of hardware or software tampering on its motherboards — www.reuters.com/… & arstechnica.com/… The Marriott Breach Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing — www.nytimes.com/… An interesting related opinion piece […]
Continue readingNC #685 Rocket; PhotoBulk; Compression, Encryption and Archive; PSA on Photos After Accidents
In this week’s show, you’ll learn how to do emoji like the cool kids with Rocket app for macOS. You’ll learn how to batch resize, rename and watermark images with PhotoBulk for macOS. Then we’ll get even geekier while I explain the difference between formats for compression, encryption & archive. Then we’ll finish things off […]
Continue reading