Google has hired lobbyists in at least three US states to battle proposed restrictions on driving with headsets such as Google Glass.
Do you use a mobile device? (Of course you do!)
Read Sophos researcher Vanja Svajcer's paper, "Mobile Security Threat Report," and check out our expert tips for keeping the crooks away...
The scorn for glassholes has apparently now gone too far, having evolved into what might be the first violent action taken against a Glass wearer.
Just five months after the company's launch, SlickLogin has announced its acquisition by Google. The Israeli security start-up has developed a method of authenticating your smartphone using an inaudible sound wave transmitted from your computer.
Did you really think XP would go patch-free? Is Flappy Bird really dead? Did you really use the same password on more than one site?
60 Sec Security - 15 Feb 2014
News about celebrities to do with births, deaths and marriages often prove to be handy hooks for cybercrooks.
So when the ultra-popular game Flappy Bird was withdrawn recently, the crooks wasted no time pretending to keep him alive...
Just by looking at suspects, police could instantly check out their arrest records, mugshots and other key information. Of course, they could also record everything and everybody they see, regardless of whether they have a warrant or reasonable suspicion of wrongdoing.
The warning flare comes as a window for Windows users that features a "reset" button to get the browser back to factory-fresh settings.
The US government had a change of heart regarding disclosure of NSA surveillance requests. Tech companies including Facebook, Microsoft, Google, and Yahoo have duly let loose the goods - but six months stale with scant details.
Chet and Duck review the week's news in their informed and entertainingly serious style, discussing the prizes on offer at this year's PWN2OWN competition, talking about a new twist in Android malware, and reviewing the latest attack reports from Yahoo and Target...
It's called PWN2OWN because if you successfully pwn, or hack into, the competition laptop, you own it *literally* - you get to take it home with you.
But there's also $645,000 in cash up for grabs, including a Grand Prize for finding, wait for it, an "exploit unicorn"...
Surely not another payment card breach? Android malware that jumps the airgap? And what's this about a Privacy Plan Diet?
60 Sec Security - 01 Feb 2014.
Here's an intriguing tale of an Android malware curveball spotted recently in SophosLabs.
You're expecting the pitch to come at you in a predictable direction, but a hidden twist in the action brings the onslaught from another angle altogether...
What can we do to protect ourselves from stolen password databases, phishing attacks, keyloggers or credit card skimmers installed in our local ATMs? We can start with two-factor authentication. This article tells you what it is, how it works and where you can use it.
Beyond device details, data shared over the internet by iOS and Android apps can include personal information such as age, gender, and location, while some apps share even more sensitive user information, such as sexual preference.
Several US judicial system websites were offline for a spell on Friday, prompting immediate worries of some kind of organised cyber assault aimed at bringing the nation's legal system to its knees.
Why was this month's Java update a "must patch"? Should in-app purchases be allowed to target children? Is it a good idea to give Google control of your home?
Find out in 60 Second Security for 18 Jan 2014
The money gets Google the keys to our smart homes. Nest is, after all, plugged into the internet of all things with its smart thermostats and smoke alarms. The question now is, Say WHAT? Does that mean Google's going to know even more about us than it already does?!
A US man, Matthew A. Buchanan, has admitted that he and his accomplices jimmied open YouTube accounts via Google's password recovery process. They also hacked AOL email, right on up to the inbox of the AOL CEO himself.