Feedback & Followups Listener and community feedback, developments in recently covered stories, and developments in long-running stories we’re tracking over time. Another example of 2FA-bypass attacks in use in the wild: How Coinbase Phishers Steal One-Time Passwords – Krebs on Security — krebsonsecurity.com/… 🇪🇺 Pegasus Project: European Parliament awards journalism prize to investigation of use […]
Continue readingMore TagTag: encryption
Encrypted Off-Site Backups with Synology Hyper Backup
Synology 5-Bay DS1520+ $700 Without Disks on Amazon Synology – Not Just a Bunch of Disks When people look at the pricing of a Synology, the sticker shock is really shocking. I think there’s a couple of reasons why. The enclosures themselves are expensive. Filling the enclosures with drives is very expensive because you have […]
Continue readingMore TagSecurity Bits — 26 June 2020
Feedback & Followups Listener and community feedback, developments in recently covered stories, and developments in long-running stories we’re tracking over time. Zoom says it’ll provide end-to-end encryption even for free users now — thenextweb.com/… COVID Exposure Notification/Contact Tracing Apps continue to be developed around the world with continued varying levels of success: Amnesty International warn […]
Continue readingMore TagSecurity Bits — 26 January 2020
Feedback & Followups Following on from Apple’s introduction of support for FIDO2 in iOS 13, Google now allow you to use an iPhone as a hardware security token — nakedsecurity.sophos.com/… 🇺🇸 Following on from YouTube’s recent $170 million fine for breaching COPPA, a bi-partisan bill has been introduced in the US House of Representatives named […]
Continue readingMore TagDumb Question Corner – Security of Password-Protected iWork Documents
Gordon sent in a terrific Dumb Question for us a while ago and I’m finally going to answer him: Hi Allison – I have a question. You might say I have a dumb question. I wanted to know if password securing your documents is, well, secure. In my case I have a spreadsheet in Numbers […]
Continue readingMore TagDorothy’s Process to Search for the Best Secure Email Service
Intro Hello, NosillaCastaways. This is macLurker, also known as Dorothy, Allison’s gym buddy. For a long time, I have been wanting to change my primary email service & name. I’ve had it for years and years. It’s long since been sold into the dark web. It’s time to wipe the slate clean and start over. […]
Continue readingMore TagSecurity Bits – 25 July 2019
Followups The Zoom webcam/webserver issue We now have confirmation that the vulnerability was also present in the RingCentral and Zhumu apps — www.imore.com/… Apple have rolled out an additional automatic security update to address the issues with these apps — www.macobserver.com/… Related Opinion: John Gruber addresses the question Isn’t [Apple’s response] “nonconsensual technology” too? in […]
Continue readingMore TagSecurity Bits – 14 December 2018
Followup Bloomberg’s controversial The Big Hack story SuperMicro released the results of an independent audit which found no evidence of hardware or software tampering on its motherboards — www.reuters.com/… & arstechnica.com/… The Marriott Breach Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing — www.nytimes.com/… An interesting related opinion piece […]
Continue readingMore TagNC #685 Rocket; PhotoBulk; Compression, Encryption and Archive; PSA on Photos After Accidents
In this week’s show, you’ll learn how to do emoji like the cool kids with Rocket app for macOS. You’ll learn how to batch resize, rename and watermark images with PhotoBulk for macOS. Then we’ll get even geekier while I explain the difference between formats for compression, encryption & archive. Then we’ll finish things off […]
Continue readingMore TagExplaining Compression, Encryption, and Archive
One of the hardest videos I’ve done recently for ScreenCasts Online is the one just published for an app called Keka. Keka is a sweet little $2 app designed to compress and expand files. Keka itself is simple and easy to use, but understanding the technologies behind it was where the real effort came in. In […]
Continue readingMore Tag