Organisations

(get it in RSS or Atom)

Anatomy of an iTunes phish - tips to avoid getting caught out

Even if you'd back yourself to spot a phish every time, here's a step-by-step account that might help to save your friends and family in the future...

Hacking, spamming, rogue SMSes and browsers - 60 Sec Security [VIDEO]

60ss-video-250

The week's security news, turned into an entertaining lesson, turned into a 1-min video...

60 Sec Security, 26 July 2014

Sony offers games as part of $15m Playstation Network breach settlement

Sony hacking suspect smashes computers to get out of prosecution

Sony has offered gamers digital goods as part of a $15m settlement in the 2011 PlayStation Network (PSN) data breach case.

Firefox slams Chrome again in our trustworthy browser poll

Our poll says Firefox is the most trusted browser, but there's a lot of distrust too

Firefox once again outpaced Chrome, IE, Safari and Opera as the most trusted web browser. But many are not happy with their browser choices when it comes to privacy.

Read on for some of the interesting comments our readers submitted ...

Android "FBI Lock" malware - how to avoid paying the ransom

andr-cuff-250

The latest "FBI Lock" Android ransomware reported by SophosLabs follows a familiar theme.

But it has a slight sting in the tail to make it trickier to remove, so we thought we'd take you through the steps...

Android app market pirates busted by FBI

pirate-250

Six Americans charged with large-scale piracy of Android apps.

But what about their "customers"?

Is there really an increased risk of malware from unlawfully acquired apps?

SSCC 157 - Routers, Browsers, Zombies and Sysadmins [PODCAST]

chet-chat-logo-featured-250

Here it is...this week's Chet Chat security podcast.

In this episode: fixing routers, trusting browsers, killing zombies and showing TLC to sysadmins.

Google given 18 months to change its handling of user data

Google Italy

The Italian Data Protection Commissioner has given Google 18 months to change the way it treats and stores user data.

iSpy? Researcher exposes backdoor in iPhones and iPads

iphone. Image courtesy of st.djura/Shutterstock.

A "backdoor" that Apple built into iOS for developers can be used to spy on iPhones and iPads by governments, law enforcement, or cyber criminals, according to forensics researcher Jonathan Zdziarski.

"Rickmote" box Rickrolls Chromecast, forcibly earworms hapless victims

Image courtesy of Dan Petro, Bishop Fox IT

Never gonna give you up, Never gonna let you down, Never gonna run around and desert you.

Your Gmail account is fair game for cops or feds, says US judge

US judge: your Gmail account is fair game for cops or feds

A New York court on Thursday opened up our entire Gmail accounts to feds or cops with warrants, in spite of two recent decisions that went against similar requests.

Apple and Google told to stop misleading consumers about 'free' apps

Apple drags its heels whilst Google drops ‘free’ label from apps with in-app purchases

The European Commission (EC) has recently been working with national authorities and app store owners to address concerns over in-app purchases, especially where those transactions are undertaken by children. Google's response was positive, while Apple says it that it is doing "more than others" to protect parents.

Jailed Apple phishing duo also imported pickpockets and cloned credit cards

Constanta Agrigoroaie and Radu Savoae. Images courtesy of Metropolitan Police.

How's this for irony? A pair of fraudsters phished bank account details out of over 150 Apple users by sending them hairy-scary messages about their accounts having been compromised.

It's all about trust! 60 Sec Security [VIDEO]

60ss-video-250

Watch 60 Second Security for 19 July 2014 - it's all about trust!

Bing follows Google by offering 'right to be forgotten' form

Bing follows Google by offering ‘right to be forgotten’ form

It's unclear whether Microsoft will take a similar approach to Google in the way it handles Bing search results. The situation certainly needs clarification and the big 3 search engines have been invited to meet with EU privacy regulators next Thursday to discuss how the ruling should be implemented.

BlackBerry takes a pop at privacy-focused Blackphone

BlackBerry takes a pop at privacy-focused Blackphone

There's a public spat between BlackBerry and Blackphone, the spunky start-up company trying to break into the crowded mobile market with promises of air-tight security. Can BlackBerry survive the competition?

Oracle's "Patch Tuesday" brings 113 patches across 13 product families

0-250

Oracle's July 2014 security patches are out, and there's a ton of them.

Literally and figuratively...

Google+ drops real name policy. What do you think? [POLL]

Google+ logo

Following years of criticism, Google announced on Tuesday that it is waving goodbye to the real names policy it employed to block the use of pseudonyms on its Google+ social network.

'Hidden from Google' site remembers the pages Google's forced to forget

'Hidden from Google" site remembers the pages Google's forced to forget

The newly launched site is archiving the pages Google was forced to de-index in the name of opening up to the internet as a whole the discussion regarding what should or should not be "forgotten."

SSCC 156 - Warbiking in Manhattan, hubris for Google, and how less can be more [PODCAST]

chet-chat-logo-featured-250

Sophos experts Chester Wisniewski and Paul Ducklin are back with this week's security podcast, turning plain old news into advice you can use.