Mega, the cloud storage service brought to you by Kim Dotcom, has released the first feedback on its bug bounty program.
It's only a week in, so the major prizes haven't been scooped yet...and Mega's saying they'll be safe for "a few billion billion years" yet.
The security of web transactions is again in the spotlight as a pair of UK cryptographers take aim at TLS.
Like 2011's much-talked-about BEAST attack, it has a groovy name: Lucky Thirteen.
Even if you run a tiny website and don't have much to hide, you (and your customers) are nevertheless at risk from criminals.
For example, @JokerCracker, who openly gives his reason for hacking as, "It's just a personal challenge".
An allegedly Egyptian hacker going by the name ViruS_HimA has allegedly hacked into Adobe.
Wherever the data actually comes from, it reveals yet more poor password hygiene at both the client and the server...find out just how bad.
Cracking the password hashes exposed in the recent Philips data breach was interesting, but there was just as much to be learned from the rate of recovery as from the password recovery itself.
We've prepared some mini-infographics to show you what we mean...
Just how unique is is your private key?
Is there a chance that someone else, without any malice aforethought, might unexpectedly end up with a key pair that is identical or at least dangerously similar to yours?
Don't just read the latest computer security news - watch it in 90 seconds!
This month: the WikiLeaks show, massive Gawker password theft, an out-of-the-blue OpenBSD accusation, and virtual property stolen from Lineage II.
We're into the back end of November, so you were probably thinking that nothing would have time to oust Stuxnet as computer security hyperbole of the year.
Seems you were wrong. The security news wires are abuzz with a new story.