- đď¸â Your Security Checklist
- đđď¸ Test Your Security Skills
- đ° Your Weekly Security Update
- 𤨠This Should Be on Your Radar đĄ
- đ Security Fail of the Week đ
- đđą Security Updates from Apple đ
If you take nothing else from this newsletter, just do these three things to protect yourself:
- Create a password-sharing group to share passwords with friends and family. If you share an account with a friend or family member, creating a password-sharing group in the Passwords app will keep your passwords secure.
- Remove location metadata from photos and videos before sharing. If you have Location Services enabled, your photos and videos are tagged with location data that others can see. Luckily, it can easily be removed.
- Take a few minutes to perform a Safety Check on your iPhone. The Safety Check feature allows you to review which apps and contacts have access to your personal data.
What should you do in the following scenario?
You keep getting windows showing ads popping up on your Mac, even when your web browser isnât open. Whatâs the first thing to do? đ¤Â
- Throw away your Mac and buy a new one.
- Open the Applications folder and uninstall any suspicious-looking apps.
- Run a malware scan using a service like Malwarebytes.
- Use TimeMachine to restore your Mac to a backup from before this started happening.
- Go to System Settings > General > Transfer or Reset > Erase All Content and Settings, and refresh your operating system back to factory defaults.
Scroll to the bottom to see how you did!
With increased immigration enforcement happening all over the country, most notably these days in the Twin Cities, the odds of witnessing an encounter with law enforcement or having one yourself have gone up significantly. Itâs important to know what steps you can take from a digital privacy and security standpoint to stay safe.
Any time you're in public, you should know that photos and videos can be used to identify you or others who might be in the background of your recording, and metadata can be used to track your location. Law enforcement can and has used this information to identify citizens recording their actions. Thatâs why itâs important to take certain precautions, like disabling location tracking for the Camera app, turning off Face ID, and setting an alphanumeric passcode. To ensure maximum privacy, you should also make sure message previews are switched off. These are just a few of the steps you could take to protect yourself, but The Conversation has a detailed breakdown of some of the more nuanced options. Check out their article for more.
It is and has always been legal to record law enforcement activity, both with photos and videos, but it can also pose certain risks to the person recording. Different states have different laws about how close a bystander is allowed to get while recording police, and it is never legal to interfere in law enforcement operations.
The Bottom Line: Before you go to any event where law enforcement might be present, consider taking some extra steps to protect your digital privacy.
Anonymous Facebook User Stays Anonymous Despite DHS Demands
An anonymous Facebook user has successfully won a court case to block the Department of Homeland Security from obtaining his identity from Facebook. A couple of weeks back, DHS sent a summons to Meta, requesting identifying information about a Facebook account holder known only as John Doe, who allegedly ran a Facebook page dedicated to sharing immigration and due process rights, as well as fundraising and vigil information. DHS claimed that the page was sharing âpictures and videos of agentsâ faces, license plates, and weapons, among other things.â However, John Doe was quick to retaliate with a lawsuit, asserting that DHS was infringing on his First Amendment rights. John Doe shared all of his groupâs posts with the court, and DHS withdrew its data requests shortly after. Check out the full story at Ars Technica for more details.
The Bottom Line: We recommend caution in what you share on social media. In this case, a court order prevented Meta from unmasking an anonymous account. But it is fairly hard to make an anonymous accountâyou need a pseudonym for a username, no photos of you, and to take great care in what and where you post, who you accept friend requests from, etc. Thatâs not how Facebook wants you to use their platform: They strongly encourage users to use their real names as usernames, to post photos of themselves, to connect with real-life friends, and more. Most things posted to Facebook are easily accessible to anyone on the internet, including stalkers, bullies, private eyes, and law enforcement.
Immigration Scams on the Rise
Scams are continuing to grow in 2026, and scammers themselves are becoming increasingly cruel. A new scam has emerged amid immigration fears in which scammers target undocumented individuals, pretending to be immigration lawyers. They offer to help immigrants and pressure them into sending money, going so far as to fake calls from ICE to induce panic in their victims. Thatâs just one of many scams. Head over to PC Mag to find out more about the biggest scams to watch out for this year.
The Bottom Line: Scammers are constantly coming up with new ways to deceive their victims and steal their money. Itâs important to stay educated and up-to-date with the latest scams so that you can spot them more easily.
Entering the US May Soon Require Five Years of Social Media History
Under new rules from the Department of Homeland Security, foreign travelers entering the United States may soon be required to turn over five years of social media history to Customs and Border Protection (CBP) before entering the country. Additionally, CBP could require travelers to submit biometric information, like fingerprints or even DNA. CBP says that these new rules, which only apply to citizens from countries that are a part of the Visa Waiver Program, are to protect the US from terrorist attacks and hateful ideology. You can read more at NPR.
The Bottom Line: Using social media history as a benchmark for whether or not someone should be allowed into the country is uncharted territory. Without any clear-cut guidelines about what might cause someone to be denied entry, it gives CBP authority as to what constitutes a threat to the US. Regardless of the intent of these new rules, theyâre certainly going to make traveling to the US more difficult for tourists.
149 Million Passwords Leaked
A security researcher recently discovered a massive database of 149 million usernames and passwords for sites and apps like Gmail, Facebook, Apple, Netflix, and many others. The database was completely unsecured and fully available to the public. It is unknown who the database belonged to, but the researcher successfully contacted the hosting service and had the database taken down. However, anyone could have downloaded or copied the database while it was up, putting millions of accounts at risk. Read more at Wired. The database was likely compiled by data-stealing malware.
The Bottom Line: As always, you should be using a password manager for this exact reason. Passwords get leaked all the time, and if you use the same password across multiple services, one leak means theyâre all leaked. A password manager can ensure you have a unique password for every login, so if itâs leaked, your other accounts wonât be compromised.
Related: Best Password Manager for Your iPhone
Â
France and the UK Separately Consider Banning Youth from Social Media
Following in the footsteps of Australia, which passed a social media ban for youth under 16 last December, France is moving to ban social media for anyone under the age of 15. The bill passed through the AssemblĂŠe Nationale earlier this week and must now pass the French Senate before potentially becoming law. The UK is also considering a similar ban for children under the age of 16. The House of Lords voted to include the ban as an amendment to a bill related to schools.
The Bottom Line: Social media bans are tricky and should be handled with care. Whether you support or oppose a ban on social media for children, you should make your concerns known to your local representatives. The voices of citizens are known to affect changes in policy.
How Private Is WhatsApp?
A class action lawsuit has been filed against Meta, claiming that WhatsApp messages are not truly end-to-end encrypted and are fully readable by Meta employees. The lawsuit alleges that WhatsApp messages are stored on Meta servers and that the company has the tools to decrypt them. However, Meta has strongly denied the allegations. A company spokesperson claims that WhatsApp messages are E2E encrypted using the Signal Protocol, making it impossible for Meta to access them. Read more at Cybersecurity News. Weâll be interested to see what comes out in the course of this lawsuit.
WhatsApp has also recently rolled out a feature called Strict Account Settings, which automatically blocks media and attachments from unknown senders and silences calls from unknown numbers. Strict Account Settings also makes your profile more private, hiding your profile photo, bio, links, and online status. This privacy-enhancing feature is designed for journalists and public figures, but anyone can turn it on.
The Bottom Line: Metaâs denial of the allegations is unsurprising. No company would outright admit to having access to user messages that were previously claimed to be encrypted. The lawsuit should bring the truth to light. In the meantime, if you use WhatsApp and are concerned about being contacted by unknown numbers, you can enable Strict Account Settings by going to your WhatsApp account > Settings > Privacy > Advanced. As of publication, the setting is not available everywhere, so if you donât see it, try checking back in a day or two.
Infostealer Malware Sneaks into Google Search Results
A common malware distribution technique has been gaining traction in the last few months. An ongoing campaign is using Search Engine Optimization (SEO) poisoning to trick unsuspecting macOS and Windows users into downloading infostealer malware. SEO poisoning works by tricking search engines into thinking that a malicious site is the most likely to answer a userâs search query. In one recent example, attackers set up a GitHub repository that looks to belong to a legitimate app developer using commonly searched keywords. For example, if one were looking to download an app called PagerDuty, they might enter the name of the app into Google and come across a GitHub link that looks like it belongs to the app developer. Then, when attempting to download the PagerDuty app from GitHub, the user instead downloads the infostealer malware. You can read more about this campaign at Daylight.
The Bottom Line: Always download apps from the macOS App Store. If the app you are looking for is not available on the App Store, be sure to seek out the appâs official website. Do not download apps from third-party sites or sketchy GitHub repositories.
Massive Number of SMS Messages Freely Visible Online
Most phones these days use encryption for their text messages, either the Apple iMessage protocol or the RCS messaging used by Android phones. But the old unencrypted SMS system is still in use. A paper published last week and reported on by Ars Technica found that more than 175 different companies involved in managing phone networks had set up more than 700 different nodes in the networks that were recording unencrypted SMS messages into archives freely visible on the internet. Put another way: millions of peopleâs text messages were just visible on the internet. Sign-in links sent via text message are a common way to log in or authenticate your account for many websites and apps, and those links were publicly visible as well, putting the accounts at risk
The Bottom Line: If a service you use offers a sign-in link that is sent over text message, avoid using it if possible. The message may be sent using SMS, and SMS messages are not very secure. iMessage and RCS messaging are more secure, but there is no way to know if a website or service is going to use one of those when messaging you a login link or MFA code. Instead, where possible, rely on generating codes with your password manager, or (better yet) use a passkey.
Microsoft Accidentally Routes Example Traffic to Cablemakerâs Website
A glitch in Microsoftâs system meant that millions of emails were sent to a Japanese company that makes cables. Strangely, the company never complained, but a security researcher discovered the problem. There is a website, example.com, which is meant to be used as an example of a website whenever a developer or engineer needs to test something. It doesnât lead to a real website; itâs just for documentation purposes, and since the beginning of the internet, itâs not been for sale. Nobody can buy example.com; itâs built into the fabric of the internet. But due to a glitch in Microsoftâs system, people who tried to set up Outlook accounts for an @example.com email address would have sent a confirmation email to a Japanese cable-making companyâs web server, one that had nothing to do with example.com, Microsoft, or presumably whoever was trying to create an account. Read more at Ars Technica.
The Bottom Line: The internet is hard and weird. As a technology, itâs immensely complex. Bugs like this happen sometimes, and itâs nice when nobody gets hurt.
Everything you need to know about Appleâs latest software updates.
- The most recent iOS and iPadOS is 26.2.1
- The most recent macOS is 26.2
- The most recent tvOS is 26.2
- The most recent watchOS is 26.2.1
- The most recent visionOS is 26.2
Apple rolled out a minor bugfix with iOS 26.2.1 and watchOS 26.2.1 to address unspecified problems in the support for AirTags 2.Â
Additionally, older iPhones recently received a new update to iOS 12.5.8. The update renews certificates that allow these older iPhones to continue using iMessage, FaceTime, and other Apple services. Read about the latest updates from Apple.
If youâre seeing ad windows pop open when youâre not browsing the web, thereâs a high chance youâve got some malware running on your device. Weâd probably start with 3: Run a malware scan from a service such as Malwarebytes. Make sure to download a reputable malware scanner, though; some malicious apps camouflage themselves as malware scanners. We like Malwarebytesâit has a sterling reputation. If that doesnât work, you could try removing and reinstalling your web browser (e.g., Chrome, Firefox, Brave, or Safari). The malware might have infected just the browser. If that doesnât work, weâd start looking into more drastic measures like resetting the system to factory defaults.
There is far too much security and privacy news for us to cover it all. When building this newsletter, we look for scams, hacks, trouble, and news to illustrate the kinds of problems Apple enthusiasts may encounter in our private lives, and the self-defense we can practice to keep our devices, accounts, and lives secure. Our commentary focuses on practical advice for everyday people. This newsletter was written by Cullen Thomas and Rhett Intriago and edited by August Garry.
Want to keep your Apple Account secure? Check out:
|

