Which pets make the best/worst passwords?
How many times did Google make the same coding blunder?
Find out this and more in our one-minute wrapup of the week's security lessons!
What a coincidence! A Facebook hoax claming that images can infect your computer...and then a Microsoft zero-day that uses images to infect your computer.
Chet and Duck talk you through the latest news...
Fast on the heels of reports that Russia allegedly passed out boobytrapped USB sticks at the G20 summit, iPads were plucked from users' hands at a UK Cabinet meeting out of fear that they might be bugged by foreign intelligence agencies.
Edward Snowden released "A manifesto of truth" to Der Spiegel on Sunday. In the letter, he asserts that his leaking of classified information is justified by the subsequent debate sparked over NSA spying. What do you think?
Learn how cryptanalysts think, and why cryptographers feel such terrible dismay when companies that really ought to know better make mammoth mistakes.
Paul Ducklin deconstructs the data leaked in Adobe's latest megabreach...
The crooks behind the CryptoLocker malware seem to have introduced a second chance option for victims who change their minds about paying up.
A touch of fun but with a serious side - and only a minute to watch it.
Give our weekly "60 Second Security" video a whirl today...
Cloud-based database services company MongoHQ is in "we'd better fix things" mode this week, following a network intrusion that proves the old adage that once you've been breached, all security bets are off.
A University of Surrey researcher created a cheap receiver from off-the-shelf electronics and was able to eavesdrop on contactless card payments at distances of 20-90 centimetres - collecting credit card numbers, expiry dates, and cardholder names. This despite the fact that one of the main security features of contactless cards is a requirement not to transfer payment data in excess of 10cm from a reader.
Adobe originally estimated that the breach affected around 2.9 million users. As it turns out the number is actually 38 million, with the information taken including Adobe IDs, encrypted passwords, customer names, encrypted debit and credit card numbers, expiry dates and customer order details.
A Florida man will go to prison for defrauding student aid accounts, while his two fellow-conspirators have been given probation and community sentences.
The group's techniques should serve as a reminder that it's not just the information stored on our computers that we need to keep secure.
Is that a gun, or are you just upgrading the printer? What if your iPhone has a bug in the lock that locks the lock screen? Will Chrome's continuing support for XP make us safer, or merely lazier?
It'll only take 60 seconds to find out the answers!
The fifth grader from Montreal pleaded guilty to DDoS, website defacement and accessing databases by exploiting security holes. He wasn't politically motivated, his lawyer said, and swapped his ill-gotten information for video games.
Former US Vice President Dick Cheney's doctors disabled his pacemaker's wireless capabilities to thwart possible assassination attempts, he said in an interview with CBS's "60 Minutes".
A threat that doesn't just attack, but asks you to put in a password first?
Sounds weird, but the trick worked for malware in the past, and is now being used in phishing
Fraser Howard of SophosLabs explains...
The crooks who pilfered Adobe's source code are likely the same ones who went on to exploit Adobe ColdFusion code to breach the PR Newswire press release service.
It might have been an innocent mistake, but when an intruder attempted to access the email account of an Indian conservationist, fears went up that poachers were after the location data for one of a dwindling number of endangered tigers, the parts for which bring huge profits on the wildlife black market.
Hopefully, the hackers are about as good at exploiting the code and opening a "gateway for new malware and exploits" as they are at protecting the code, which a security firm discovered on a server open to the internet.