When there's nothing funny on American TV, you can always rely upon an infomerical selling some crazy product to have you chuckling or simply agog in disbelief that anyone would ever buy such a thing.
Watch this video, you won't believe your eyes.
Malware researcher Paul Baccas reveals how an Excel spreadsheet using the password "VelvetSweatshop" could be designed to put your computer at risk.
Japanese boffins think they might have found an imaginative way to stop malware stealing your passwords as you enter them online.
But will it really work?
Hackers interrupt TV channels to broadcast an emergency alert, warning that the bodies of the dead have risen from their graves, and attacking the public.
A good reminder to not use default passwords? Watch the video to see what happened.
By popular demand, here is a video showing you how to solve the Skyfall #sophospuzzle.
In James Bond style: recover a stolen file, decrypt it, use it to identify a famous person, find out where he was incarcerated, and geolocate the prison...
Research released today has revealed that the theft of mobile phones is on the rise.
This isn't just about losing an expensive phone - there's also the threat of losing your data and money.
Learn how to better protect your phone.
Many of you have been asking us about the Reveton ransomware, which claims that the FBI has fined you, and locks you out of your PC until you pay up.
Learn what it looks like, and what to do if you or one of your friends and family encounter it...
iFrames and script tags are being used by malicious hackers to serve up drive-by internet attacks, silently and invisibly.
Watch our video to find out more.
Web-based malware dynamically obfuscates itself to try to evade detection by anti-virus software.
Watch this video to see it in action.
Adobe PDF vulnerability exploitation caught on camera.
Sophos security expert Chet WIsniewski demonstrates how malicious PDFs can infect your computer.
The much-talked-about DNS Changer 'internet blackout' happens on Monday, July 9.
But are we really going to have a 'blackout'?
Paul Ducklin explains what's going on, and how to avoid trouble, in this easy-to-follow video.
By popular demand, here is a video explaining how to solve the puzzle we published on our AusCERT 2012 conference T-shirt.
44 solvers from 14 countries cracked it in the time allowed - find out how they did it!
Cybercrime is big business these days, in fact it's an industry. So it's not a surprise to find that criminals are embracing ecommerce. But some will be surprised to discover just how professional and legitimate criminal websites can appear.
By popular request, here is a video explaining how to solve the cryptographic puzzle we published on our RSA 2012 conference T-shirt...
Working in the computer security industry, we're pretty used to seeing malware and hacking misrepresented on our TV and movie screens.
Here are some of our favourite examples.
By popular request, here is a video explaining how to solve the Dragon Tattoo-themed puzzle we published earlier this week...