Following its recent epic breach, Target has announced that it's putting its technology through the wringer. Jacob will be the first high-level executive to leave since the incident.
The US jam and jelly maker is just the latest fly to get stuck in the same web that ensnared dozens of companies last year, including some of the world's largest data brokers and at least one credit card processor.
The Bitcoin infrastructure isn't perfect - for example, it has a cryptographic problem known euphemistically as "transaction malleability."
But can this alone explain missing Bitcoins to the tune of $500,000,000?
What about support for OS X Lion and Mountain Lion? Can a rootkit be a blessing in disguise? Will federal US data breach laws make things better or worse?
Chester and Duck once again aim their entertaining expertise at the security news of the week...
The site's been under attack since Thursday. The cyber-extortionists behind it have demanded $300, but Meetup won't pay even this ridiculously small amount, for very good reasons.
The "Girl killed herself video" bait-and-switch scam on Facebook, now in its fifth year, is back.
Here are three tips to help us stamp these scams out at last.
Be aware before you Share!
Twitter goofed, sending out a deluge of password-reset emails on Monday evening that turned out to have been triggered by a system error. Yes, it's a false alarm, but what the heck - any excuse to nag people about password reuse will do!
A tiny but intriguing open source project entitled iCloudHacker attracted interest over the weekend.
It claims to "bypass Apple's theft protection" - and although that's streching the truth a bit, it has some lessons to teach us about encryption...
The Russian news site RT.com was compromised over the weekend, replacing the words "Russian" and "Ukrainian" in some headlines with the word "Nazi".
Kristy Ross, employee at rogue anti-virus pushers Innovative Marketing Inc., dragged her appeal against her whopping $163 million fine through the courts for years - and has lost. Do you think the fine fits the crime?
How harmless is that "Facebook shutting down on 29 February" hoax?
Is system reimaging really a security tool?
Find out this and more! 60 Sec Security - 01 Mar 2014
Paul Ducklin hooks up "live at RSA" with Chester Wisniewski and John Shier for a Conference Special podcast.
Find out what was good, weird, interesting, or all of the above, at this year's RSA 2014 event!
Three former Purdue University students are thought to have altered their grades by breaking into staff offices and attaching keyloggers to computers operated by class professors, possibly by replacing the keyboards with doctored versions.
Chester ducks out of booth duties at the RSA 2014 conference in San Francisco to bring you this week's Chet Chat.
From Apple's SSL bug to Adobe's second-in-a-month emergency Flash update, Chet and Duck once again help you to learn from others' mistakes.
The Gameover botnet gang has been trying new techniques lately: most recently comes the introduction of a kernel-mode rootkit called Necurs, making the malware harder to find and remove.
Senior Researcher James Wyke of SophosLabs investigates...
A new Google Chrome browser extension lets email senders using Google accounts see when recipients open email, who exactly opened the email, and where the recipient is located. And sorry, but no, recipients don't have a say in the matter whatsoever, since we don't have to sign up for the extension to have it blab about us.