In yet another "don't open that e-birthday card" saga, 33-year-old Carlos Enrique Perez-Melara, now on the FBI's 10 most wanted cybercriminals list, allegedly sold malware that planted a keylogger, as well as remotely controlling a victim's computer and webcam.
What a coincidence! A Facebook hoax claming that images can infect your computer...and then a Microsoft zero-day that uses images to infect your computer.
Chet and Duck talk you through the latest news...
Microsoft is warning about a brand new security hole that could let criminals get control of your computer through booby-trapped image files.
Four months ago, the Android platform was stirred, if not shaken, by a pair of code verification holes.
Turns out there was a third one, now fixed in Android 4.4, better known as Kit Kat.
Paul Ducklin looks at what we can learn from it...
Advertising supports a large chunk of the apps we use on our mobile devices. But without oversight, the behaviour of ad frameworks risks crossing all manner of privacy and security lines. A proposed project aims to address this issue and define a standard for acceptable mobile ads.
Fast on the heels of reports that Russia allegedly passed out boobytrapped USB sticks at the G20 summit, iPads were plucked from users' hands at a UK Cabinet meeting out of fear that they might be bugged by foreign intelligence agencies.
The crooks behind the CryptoLocker malware seem to have introduced a second chance option for victims who change their minds about paying up.
Today is the 25th birthday of the infamous Internet Worm.
What have we learned? Could it happen again?
"BadBIOS" is an unfolding story about a virus that is claimed to have some remarkable characteristics - such as jumping airgaps, spreading using sound waves, and taking over your firmware.
How does it work? What do we know? Is it real or a hoax? Paul Ducklin takes a look...
An anonymous person, claiming to be Anonymous, recently fired off a hacking threat against Singapore's financial systems.
Should this threat be taken seriously?
Microsoft just published its January-to-June 2013 Security Intelligence Report.
The results seem to PROVE that you should get rid of Windows XP as soon as you can.
Paul Ducklin checks the strength of the "proof"...
Part Two of our examination of an IE exploit.
This is a great read if you want to get a feeling for how cybercrooks think. (Don't worry if you aren't technical: it's clear and jargon-free.)
Former US Vice President Dick Cheney's doctors disabled his pacemaker's wireless capabilities to thwart possible assassination attempts, he said in an interview with CBS's "60 Minutes".
A threat that doesn't just attack, but asks you to put in a password first?
Sounds weird, but the trick worked for malware in the past, and is now being used in phishing
Fraser Howard of SophosLabs explains...
This article explains how the CryptoLocker ransomware works, including a short video showing you what it does.
The article tells you about prevention, cleanup, and recovery, and explains how to improve your security against this sort of threat in future.
Occasionally we find an attempt at phishing that we grudgingly have to admit shows a resourceful sense of occasion.
Here's an example: an email supposedly from Microsoft to sort out the after-effects of recent failed updates...