Join the dynamic duo for another entertaining quarter-hour on security.
There's Patch Tuesday, the impending end of XP, Advanced Persistent Threatitis, and some astonishing statistics about CryptoLocker.
When we look at some of the biggest security headlines of the past year - Target data breach, Cryptolocker ransomware, Snowden/NSA leaks - there's one big lesson we can all be taught: secure everywhere.
Can you believe that a brand loyalty company would take two weeks to tell its loyal customers their data had been stolen? Oh, and that it wasn't encrypted, either?
What does this tell us about security? Find out in the latest episode of the Chet Chat...
The UK's National Crime Agency has put out a CryptoLocker ransomware alert - the malware is still a huge problem, even after weeks of high profile coverage.
Here's what YOU can do to help prevent it...
Which pets make the best/worst passwords?
How many times did Google make the same coding blunder?
Find out this and more in our one-minute wrapup of the week's security lessons!
The crooks behind the CryptoLocker malware seem to have introduced a second chance option for victims who change their minds about paying up.
This article explains how the CryptoLocker ransomware works, including a short video showing you what it does.
The article tells you about prevention, cleanup, and recovery, and explains how to improve your security against this sort of threat in future.
There's a destructive malware threat on the loose that calls itself "CryptoLocker."
It's what's known as ransomware, because that's what it does: holds your files to ransom.
Paul Ducklin tells you what you need to know...
A US child abuse image collector turned himself in to police earlier this month, after ransomware hit his PC and showed messages warning him that the FBI were on to his nasty activities.
Following on from the recent analysis of the Glazunov exploit kit, Fraser Howard takes a detailed look at two other closely related kits. He finds several similarities which suggest that the same criminal group may well be behind all three.
Should suspected copyright abusers really have their computers attacked with malware in a bid to retrieve stolen data?
Malware targeting point-of-sale (POS) systems has been a major trend for the last six months. With easy pickings to be had from mom-and-pop shops, this pattern is only going to grow until people start fighting back with better system security, and ideally better payment card systems.
Virus Bulletin's Technical Director John Hawes takes a look....
A ransomware attack takes a sinister twist - displaying images of the purported sexual abuse of children in an attempt to scare computer users into paying up.
What's a reasonable price to pay to get your data safely returned to you from the guys who stole it?
How about 10,000 Rubles? No?
According to the cybercriminals behind this new ransomware targeting Russians, the answer is "да".