Apple just announced the first point update for its recently released OS X Mavericks.
Most of the fixes and enhancements are of the not-really-to-do-with-security sort, but the update includes a new version of Safari, with remote code execution patches.
Created by an advertising agency in Boulder, Colorado, the web-borne Happy Hour Virus lets you deliberately simulate a security problem in order to leave work early.
Paul Ducklin stayed back late to take a look...
A touch of fun but with a serious side - and only a minute to watch it.
Give our weekly "60 Second Security" video a whirl today...
Not everyone was happy about Apple's terms and conditions when it introduced dictation to OS X: speech-to-text was done in the cloud, so Apple got to listen to what you were saying.
OS X Mavericks changes that - though apparently more for performance than privacy...
By popular demand, the Chet Chat has gone back to a weekly format, so your favourite security podcast will now be appearing twice as frequently!
Listen to Chet and Duck in the latest episode...
Researcher Vladimir Katalov explained how documents and backups stored in Apple's iCloud can be accessed bypassing Apple's two-factor authentication, even when enabled, last week at the Hack in the Box conference in Malaysia.
Apple's OS X 10.9, better known as Mavericks, is officially out.
The burning question for OS X fans everywhere, of course, is, "Should I or shouldn't I?"
This month's Patch Tuesday will be the tenth anniversary of Microsoft's regular security bulletins.
Paul Ducklin takes you through what's in store...
How realistic are you about your Facebook posts? Why should you encrypt your hard disks? Why doesn't the Yahoo! CEO use a passcode on her phone?
Watch this week's 60 Second Security and find out!
Here's the first 60 Second Security video of July, looking into some of the intriguing and interesting security stories of the past week.
Neatly compressed into a minute of video, why not give it a whirl?
Minority groups in China appear to have been targeted by a Mac malware attack, delivered via boobytrapped Word documents.
Who could possibly be interested in targeting their computers?
Award-winning security blogger Brian Krebs has shared details of his investigation into who might have been behind Flashback - which hit more than 600,000 Mac computers in early 2012
Apple ships OS X 10.8.3 - 11 remote code execution vulns patched, Snow Leopard and Lion get fixes too
Apple has shipped the latest point release of its flagship Mountain Lion (OS X 10.8) operating system.
There are plenty of security fixes in there, which Snow Leopard (10.6) and Lion (10.7) users get too, in standalone security updates.
Computer users should be getting used to security updates for Adobe Flash by now - after all, this is the fourth in as many weeks.
Make sure your computers are protected as soon as possible.
Technology journalist Mat Honan and Cloudflare CEO Matthew Prince have something in common - they've both been hacked by the UGNazi hacktivist group.
And what they told the RSA Conference spells bad news for those of us who love to use the internet and embrace cloud-based technologies in our personal and work lives.
Apple released a statement today acknowledging that they were victims of the same attackers that Facebook talked about last week. A zero-day Java vulnerability infected Apple Mac developers through a drive-by attack.
A targeted Mac malware attack strikes a minority group in China, exploiting an old Microsoft Word vulnerability.