Do you use a mobile device? (Of course you do!)
Read Sophos researcher Vanja Svajcer's paper, "Mobile Security Threat Report," and check out our expert tips for keeping the crooks away...
Why was this month's Java update a "must patch"? Should in-app purchases be allowed to target children? Is it a good idea to give Google control of your home?
Find out in 60 Second Security for 18 Jan 2014
Apple is understandably proud of the App Store - it has made lots and lots of money, with more or less no malware.
But not everyone has been entirely happy with Cupertino's acumen in application delivery...including the FTC.
Last year, a Googler named Dr. Elie Bursztein noticed that Apple's App Store protocols were using HTTP where HTTPS would have been much better.
Some time later, Apple has changed its ways.
Paul Ducklin explains why it matters...
It should go without saying that if you use Opera, you should update to version 12.13 as soon as possible.
But... what if you didn't get your copy of Opera from the official website?
What if, instead, you acquired your version of Opera for Mac from Apple's Mac App Store?
Apple announced today that the bait-and-switch of software screenshots in the App Store will no longer be allowed.
Once you submit an app, you'll have to stick to your original marketing materlal until the app is updated and re-approved. Good thing.
Some Android users have got a nasty scare, as three websites - involved in the distribution of cracked and stolen Android smartphone apps - were shut down by the FBI.
Malware has hit the iOS App Store! But don't panic; it won't harm your iPhone or iPad - it's Windows malware.
Yes, you did hear that right.
ZonD Eighty, the Russian hacker who brought App Store fraud to unjailbroken iPads and iPhones, has extended his "service" to OS X users.
Mac owners can now join their iDevice brethren in ripping off developers.
Chet and Duck take on the week's news once again in their inimitable and informative style.
You'll be glad to hear that there are several "good news" stories this week - data that didn't leak, malware that didn't infect, and cybercriminals who didn't get away with it!
A Russian hacker has created a website you can use to make fraudulent in-app purchases on your iPad or your iPhone.
This is a pretty big blow to Apple - especially at a time when it is facing criticism for some of the stuff it lets into the App Store in the first place.
Apple is pushing its users more and more to download apps from the Mac App Store. But what happens if the software on the Mac App Store is less secure than non-App Store versions?
iPhone users are being tricked into buying a phony screen-lock app, which is actually nothing more than a wallpaper.
Apple is prompting some of its iTunes/App Store/iOS customers to set up three new security questions and an alternate email, in an attempt to smother a growing wave of phishing and fraud.
Security researcher Charlie Miller recently published a YouTube video in which he shows, in his own words, how to break "the App Store [anti-malware] model using a flaw in the iOS code signing enforcement mechanism."
Apple wasn't best pleased!
A security hole in iOS, the operating system that powers iPhones and iPads, has allowed hacker Charlie Miller to defeat Apple’s famously discerning App Store review process.
In this week's podcast Chester Wisniewski and Ben Jupp discuss the hype and the truth behind the recent Mac rogue security attacks and discuss Obama's proposed changes to RICO, Square Enix and Sony.
If you are using the Apple Mac App Store you might be putting your computer's security at risk, because of the service's tardy attitude to critical updates.
Apple introduced the App Store for OS X today which enabled a very simple way to pirate their applications. Will cybercriminals take advantage of this to distribute malware infected applications?