A touch of fun but with a serious side - and only a minute to watch it.
Give our weekly "60 Second Security" video a whirl today...
Not everyone was happy about Apple's terms and conditions when it introduced dictation to OS X: speech-to-text was done in the cloud, so Apple got to listen to what you were saying.
OS X Mavericks changes that - though apparently more for performance than privacy...
By popular demand, the Chet Chat has gone back to a weekly format, so your favourite security podcast will now be appearing twice as frequently!
Listen to Chet and Duck in the latest episode...
Is that a gun, or are you just upgrading the printer? What if your iPhone has a bug in the lock that locks the lock screen? Will Chrome's continuing support for XP make us safer, or merely lazier?
It'll only take 60 seconds to find out the answers!
Researcher Vladimir Katalov explained how documents and backups stored in Apple's iCloud can be accessed bypassing Apple's two-factor authentication, even when enabled, last week at the Hack in the Box conference in Malaysia.
Apple's OS X 10.9, better known as Mavericks, is officially out.
The burning question for OS X fans everywhere, of course, is, "Should I or shouldn't I?"
Apple just closed up yet more lockscreen holes in iOS 7.
Reading the release notes will give you a sense of déjà vu - one of the bugs is pretty much the same hole that was patched in iOS 7.0.2...
It took students one week to dismantle the security keeping them away from online candy such as Twitter and Facebook. That leaves one very peeved school system, dismayed at the fact that its kids are smarter than the adults who tried to corral them into this dreary thing called "the curriculum." The verdict: No more iPads for YOU!
How do you copy fingerprints? Which is the most trustworthy browser? Who will use Facebook for payments? How long does an email address live?
Satisfy your curiosity with this week's 60 Second Security!
Two motorists using their iPhone Maps application followed it right across one of the runways - as in, where airplanes might have squashed them - and onto the airport ramp side of the passenger terminal.
Apple has quickly fixed two lockscreen bugs that it introduced with iOS 7.
Well done, Cupertino!
(To all hardcore Apple fans reading this: that's not irony. I really mean it.)
We really didn't want to write another Apple iOS 7 story.
But with reports surfacing that HAL's smooth-talking stepsister Siri lets you *talk* your way into a locked iPhone, we couldn't help it.
The biometrics team of Germany's well-known Chaos Computer Club claims it has "cracked" Apple's Touch ID system.
From a fingerprint left on glass, the team claims to have used a technique documented by the CCC back in 2004 to produce a "fake finger."
Another iOS 7 lockscreen bypass has surfaced: this one lets you call anywhere in the world for free.
OK, not really "for free" - someone has to pay, and that's the owner, who probably assumed that the phone lock actually locks the phone part of the phone!
Why did Brazilian hackers target NASA? What happens to doxers? How much does it cost to get started in card skimming? And how much is a copy of your fingerprint worth?
Watch 60 Second Security and find out!
Numerous individuals have so far pledged Bitcoins, booze, cash, and more if you can clone someone's fingerprint and unlock an iPhone 5s.
You're allowed to use your own fingerprint, to make experimenting easier...so, go on! What are you waiting for?
Serial iOS bug finder "videosdebarraquito" has struck again.
With some deft fingerwork, he can get into your photo gallery from the lockscreen and do pretty much what he wants with your images - such as publishing them online.
Make sense of vulnerability jargon by listening to this 15 minute podcast...
With recent updates from Microsoft (three times), Adobe, Oracle, Apple and Firefox, the timing could scarcely be better.