Chet and Duck help you to learn from recent security news, both good and bad.
In this episode: the massive Target breach; Microsoft's and Apple's attitude to updates; and how to respond to Google's recent changes to image rendering for Gmail users.
What prison sentence for the man who pioneered online carding? How many credit cards did Target lose? Does your encryption software "speak" to passers-by? How to keep your kids safe online over the holidays?
Find out in 60 seconds!
Turn bad news into good with "what you can do better" advice from Chet and Duck.
Learn from: an XP zero-day, a spate of Bitcoin "bank robberies," the outcome of a European user security survey, and yet another cryptographic blunder, this time from Drupal.
Blessed be Facebook for using this real-world example to 100% back up Naked Security when we proselytize about the evils of password reuse. And if you're worried that Facebook's mining of breached Adobe customer records and quarantining of users is Big Brother-ish, fear not: the company didn't have to store passwords in clear text or pull any other boneheaded security move to know just what its customers' reused passwords are.
Learn how cryptanalysts think, and why cryptographers feel such terrible dismay when companies that really ought to know better make mammoth mistakes.
Paul Ducklin deconstructs the data leaked in Adobe's latest megabreach...
German researchers have shown how commodity mobile phones can be turned into call jammers.
Worse still, their attacks could be adapted for eavesdropping and even interception, where a crook receives your calls or SMSes instead of you.
How safe is the SIM in your mobile phone? Could it be remotely infected with malware?
Possibly - watch this week's 60 Second Security video and find out more!
Are cryptographic holes the new buffer overflows?
Take a look at this week's 60 Second Security video and let us know what you think!
The Cryptocat project is apologizing and urging users to update immediately.
Founder and developer Nadim Kobeissi took to a live stream to address questions from a show in Germany.
Lias Vaas investigates...
It's almost time for the annual AusCERT conference in Queensland, Australia.
And for everyone who's asked, the answer is, "Yes! There's a #sophospuzzle!"
No, you don't have to be there to join in...
Snapchat claims to let you share even "ugly selfies" because once they're viewed they "disappear forever."
US-based computer forensics geek Richard Hickman thought he'd find out how true that claim was...
If you were taken prisoner and wanted to send messages home under your captors' noses, what would you do?
Find out how a Royal Navy officer did just that during WW2, and have a go yourself at hiding a secret message in an innocent-sounding letter home!
An iPhone messaging app that claims to be "totally secure" is offering a £10,000 prize to anyone who can intercept a message from it.
Paul Ducklin wonders how you are supposed to win the prize if the app really is "totally secure"...
The Kim Dotcom saga took yet another turn today when the New Zealand Court of Appeal knocked back one of the big fella's earlier minivictories again US law enforcers.
Paul Ducklin takes you through the timeline of the story so far, and tries to guess what happens next...
For over 12 centuries an intense battle has been fought between the code-makers and the code-breakers. But despite decades of cryptanalysis, there are many ciphertexts which have gone unsolved, leaving us in mystery.
Here's our top ten list, can you solve them?