Monthly Archives: February 2013
Fellow Naked Security writer and industry stalwart Graham Cluley just emailed from San Francisco to tell us that we won the Best Corporate Security Blog in the 2013 Security Bloggers' Awards!
Way to go, team! (And thanks to all our readers who nominated us in the first place.)
Attackers could - until Google issued a fix last Thursday, that is - bypass Google accounts' two-step login verification, reset a user's master password, and gain full profile control, just by capturing a user's application-specific password.
Be on your guard if you see any of your Facebook friends post a message about an alleged Rihanna sex video.
Technology journalist Mat Honan and Cloudflare CEO Matthew Prince have something in common - they've both been hacked by the UGNazi hacktivist group.
And what they told the RSA Conference spells bad news for those of us who love to use the internet and embrace cloud-based technologies in our personal and work lives.
The number of people using peer-to-peer (P2P) services to download music fell by 17% last year, compared to 2011, according to a report released yesterday.
You too can get into somebody's locked iPhone, particularly if you have a prehensile tail and don't mind (almost) placing a phony emergency call. Which you a) probably don't and b) hopefully do.
Gabor Szappanos from SophosLabs takes a detailed examination of a targeted attack involving multiple stages and an innocent signed application - from the social engineering in the initial lure, to the technical capabilities of the malware it delivers.
Adobe tells computer users to protect themselves against "targeted attacks" that are being "exploited in the wild".
And that means patching Adobe Flash. Again.
A new technical paper from SophosLabs explores the history and technology of ransomware. From payment by SMS to public key encryption, ransomware has certainly evolved.
On January 26, US citizens lost the right to unlock their mobile phones. On Thursday, a requisite number of disgruntled people had demanded that the administration examine the issue of giving them back that right.
Conference season 2013 is on. While events like these can be great for networking and mindsharing, there can be computer security dangers lurking about. We've pulled together 8 IT security tips to help you stay ahead of the game.
EADS, maker of the Eurofighter, says that Chinese hackers attacked its computer network last year.
Is your company prepared reducing the likelihood of a successful targeted attack?
A warning spreads on Facebook about "Talking Angela", an app that gives your children some animated cat chat.
Malheureusement, it's all too simple for people to share warnings - rather than check if the facts are true.
A security research team that has alerted Oracle to a series of security flaws in Java in the past, says that it has uncovered new zero-day vulnerabilities in the software.
A report by the Islamic Republic News Agency has raised eyebrows, as it appeared to claim that Iranˈs Revolutionary Guard Corps had managed to hack and down a foreign spy drone.
But did it really happen?
Have your joined thousands of others, and become a loyal listener to the "Chet Chat" yet?
Here's the latest Naked Security podcast, Sophos Security Chet Chat 103, discussing a range of recent and newsworthy topics from the world of computer security.
Microsoft joins Facebook and Apple in the list of big companies who have suffered at the hands of malware-bearing hackers.
The social media behemoth apparently never assumed that a person with three digits worth of living to their credit would sign up to use its service.