Starbucks got into and out of privacy trouble in over the past week.
The brouhaha started when a US security researcher publicly reported a rather serious data leakage problem in the Starbucks iOS mobile app...
A Naked Security reader just received Target's advisory letter saying she'd been part of the recent breach. But she didn't find it as clear as perhaps it could have been.
Paul Ducklin takes a look...is there anything Target could have done differently?
What's the best way to deal with botnets? Should you use your bank's mobile app? Why all these data breaches? What about Patch Tuesday? Do you really *have* to update your Mac to Mavericks?
Listen as Chet and Duck dissect and explore the week's security stories...
Hot on the heels of the massive Target data breach, retail group Neiman Marcus has confirmed a mid-December security breach and that an undisclosed number of payment cards have been compromised.
The Target data breach story has turned into a bit of a bus: it's big, has lots of momentum, and three just came along at once.
First: 40M payment card details stolen. Second: 70M names, addresses and the like stolen. Third: looks like there was a specialised botnet involved.
US megaretailer Target is having a tough time of it.
Having said that, so are its customers - and even, as it now turns out, many of its non-customers, too.
Target has now joined companies like Adobe and Sony in the "hundred million plus" data breach club...
How long does it take a trendy cloud company to apologise? Do you really need HTTPS for webmail? OS X Mavericks - should you stay or should you go? And who won our crossword competition?
60 Second Security - 11 Jan 2014.
Security researcher Ariel Sanchez recently published a fascinating report on the sort of security you can expect if you do your internet banking on an iPhone or iPad.
The answer, sadly, seems to be, "Very little."
Team Snapchat, as it calls itself, has finally used the S-word in connection with the 4,600,000 phone numbers plundered from its databases last week.
Botnets, short for "robot networks", are more than just malware: they're the money making machinery of modern cybercriminals.
Paul Ducklin and James Wyke help you to understand the What, How and Why of this troublesome topic...
He/she/they could have, but didn't, publish the script for the fourth-season finale. An archive of the hacker's targets show a dizzying array of entertainers, writers, and government and military officials, meaning that even more sensitive data (I know, hard to imagine anything more sensitive than a Downton spoiler) have been accessed.
Chet and Duck look at the security stories that made the headlines over New Year 2013/2014 - from the OpenSSL "hypervisor hack" that wasn't, to the Skype Twitter breach that shouldn't have happened - and explain how we can learn from these mistakes to have a safer and more secure 2014.
Here's a brief reminder of how cybercriminals use real security disasters to cause follow-up disasters of their own.
This time, it's a "followup phish" aimed at JP Morgan Chase customers...
The big stories of 2013 were Adobe, PRISM and CryptoLocker - but what about some of the wackier stuff? Google's dead donkey? The Space Station lost and found? Gun wielding penguins?
All this and more in 60 Sec Security - 04 January 2014
On New Year's Day we wrote about a giant phone number leak from controversial photosharing site Snapchat.
The company has officially commented now...just don't expect the word "Sorry."
...what we here at Naked Security will tell you (IF you take the poll), being all open to sharing 'n' stuff. That's in stark contrast to the zip-lipped Facebergians themselves, who are polling users about the trust thing but won't tell anybody the results. *We hereby definitively define "people" as being "our readers."
A US federal court in New York closed out the year by saying that it's OK for the government to search travelers' electronic devices at border checkpoints without reasonable suspicion that people have done anything wrong, given that "reasonable" takes on a whole new dimension when you're talking about the crucial zone of border crossings.
Our weekly security podcast looks back at the big blunders of 2013 to find out what went wrong.
Let Chet and Duck help you plan for a safer and more secure 2014!