The biometrics team of Germany's well-known Chaos Computer Club claims it has "cracked" Apple's Touch ID system.
From a fingerprint left on glass, the team claims to have used a technique documented by the CCC back in 2004 to produce a "fake finger."
Numerous individuals have so far pledged Bitcoins, booze, cash, and more if you can clone someone's fingerprint and unlock an iPhone 5s.
You're allowed to use your own fingerprint, to make experimenting easier...so, go on! What are you waiting for?
Are cryptographic holes the new buffer overflows?
Take a look at this week's 60 Second Security video and let us know what you think!
If you use your iPhone or iPad as a Wi-Fi hotspot, don't let it generate the passphrase for you.
A posse of German computer scientists has found that Apple's iOS passphrase generator may give you less than a minute of security.
Mega, the cloud storage service brought to you by Kim Dotcom, has released the first feedback on its bug bounty program.
It's only a week in, so the major prizes haven't been scooped yet...and Mega's saying they'll be safe for "a few billion billion years" yet.
The security of web transactions is again in the spotlight as a pair of UK cryptographers take aim at TLS.
Like 2011's much-talked-about BEAST attack, it has a groovy name: Lucky Thirteen.
Even if you run a tiny website and don't have much to hide, you (and your customers) are nevertheless at risk from criminals.
For example, @JokerCracker, who openly gives his reason for hacking as, "It's just a personal challenge".
An allegedly Egyptian hacker going by the name ViruS_HimA has allegedly hacked into Adobe.
Wherever the data actually comes from, it reveals yet more poor password hygiene at both the client and the server...find out just how bad.
Cracking the password hashes exposed in the recent Philips data breach was interesting, but there was just as much to be learned from the rate of recovery as from the password recovery itself.
We've prepared some mini-infographics to show you what we mean...
Just how unique is is your private key?
Is there a chance that someone else, without any malice aforethought, might unexpectedly end up with a key pair that is identical or at least dangerously similar to yours?
Don't just read the latest computer security news - watch it in 90 seconds!
This month: the WikiLeaks show, massive Gawker password theft, an out-of-the-blue OpenBSD accusation, and virtual property stolen from Lineage II.
We're into the back end of November, so you were probably thinking that nothing would have time to oust Stuxnet as computer security hyperbole of the year.
Seems you were wrong. The security news wires are abuzz with a new story.