US President Barack Obama is stuck using a BlackBerry. He actually fought for the right to keep using it when he first got to office in 2009. Let's hope he still likes the gadget, because the powers that be obviously don't think Apple's security profile is president-worthy.
According to a News Limited report, customers visiting clothing retailer Witchery's mobile website were able to get at the PII of other users via a feature called "track my order."
Customers could also view every order currently being processed, not just their own...
Apple pushed out iOS 7.0.4 last week, the fourth patch in two months.
Is iOS getting buggier, or is Apple simply publishing security fixes more promptly?
European travellers will soon be able to use their personal electronic devices (PEDs) for the entire duration of their flights following a new ruling from Europe's air safety agency.
A new program, dubbed PIN Skimmer by its University of Cambridge creators, can correctly guess a high proportion of PINs by utilising the device's camera and microphone.
Which pets make the best/worst passwords?
How many times did Google make the same coding blunder?
Find out this and more in our one-minute wrapup of the week's security lessons!
What a coincidence! A Facebook hoax claming that images can infect your computer...and then a Microsoft zero-day that uses images to infect your computer.
Chet and Duck talk you through the latest news...
Four months ago, the Android platform was stirred, if not shaken, by a pair of code verification holes.
Turns out there was a third one, now fixed in Android 4.4, better known as Kit Kat.
Paul Ducklin looks at what we can learn from it...
Advertising supports a large chunk of the apps we use on our mobile devices. But without oversight, the behaviour of ad frameworks risks crossing all manner of privacy and security lines. A proposed project aims to address this issue and define a standard for acceptable mobile ads.
Is that a gun, or are you just upgrading the printer? What if your iPhone has a bug in the lock that locks the lock screen? Will Chrome's continuing support for XP make us safer, or merely lazier?
It'll only take 60 seconds to find out the answers!
Researcher Vladimir Katalov explained how documents and backups stored in Apple's iCloud can be accessed bypassing Apple's two-factor authentication, even when enabled, last week at the Hack in the Box conference in Malaysia.
Apple just closed up yet more lockscreen holes in iOS 7.
Reading the release notes will give you a sense of déjà vu - one of the bugs is pretty much the same hole that was patched in iOS 7.0.2...
One month after BlackBerry didn't release it's much-awaited BBM app for Android, imposter apps can still be found in the Google Play Store.
Should it be so easy to get obviously-bogus imitations past Google's vetting process?
Smartphones occupy a privileged position in our lives. Which do you trust enough to be your little, always-on, super computer companion? Take our poll and share your reasons.
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.
In the third part of Sophos Security Chet Chat 118, Chet interviews Vanja Svajcer to explain the rise of potentially unwanted applications on Android, what they are and how we might deal with them.
More coverage from the Virus Bulletin 2013 Conference in Berlin, Germany. Today's topics include Android botnets, malware abusing legitimate applications and defining the types of apps we allow on our phones.
Sophos has a larger than normal presense this week at the Virus Bulletin Conference in Berlin, Germany. Research presented includes bot nets, rootkits, Android and even techniques we can use to better protect others.