It's Saturday, and that means *60 Second Security*, where we aim to touch on some of the more thought-provoking security topics of the past week in just one minute of video.
Why not give this week's video a go?
Norwegian-based browser maker Opera has announced a network intrusion.
Users *may* have been infected with malware by an Opera update.
Paul Ducklin offers advice on what to do...
The process may hold up submissions, Google says, but no cause for freak-out. The scan shouldn't ever take more than an hour, it says - time well spent for the greater security good.
SophosLabs is at the centre of Sophos. It's where highly skilled analysts work round the clock to build protection from the latest threats. But what kind of people work there?
Microsoft just announced the successful disruption of 1462 "Citadel" botnets.
You read that correctly!
Not a botnet of 1462 computers, but 1462 separate botnets...
Fake anti-virus is mostly for Windows, with OS X a long way back in second place. But other operating systems aren't exempt from the depredations of cybercriminals.
Paul Ducklin shows you round some recently-discovered Android scareware...
Should suspected copyright abusers really have their computers attacked with malware in a bid to retrieve stolen data?
Little blue boxes from Tiffany & Co. are the stuff of dreams for many. Don't let an unexpected email delivery - apparently from the company - make you so giddy with an excitement that you end up with a computer nightmare.
Join SophosLabs Principal Researcher Gabor Szappanos as he takes you on a fascinating journey into the latest "product" from the PlugX malware factory.
Just about every security company publishes some sort of prevalence data - those little bar charts and top tens showing the most important and widespread threats. The raw data behind these easy-to-consume representations can be very useful to security experts and testers.
Although there has been increased talk recently on drive-by-downloads and compromised websites being used to deliver malware, it's worth remembering that email-based malware is far from dead.
In the first of a two part series, Fraser Howard takes a closer look at the Redkit exploit kit.
Learn more about how this kit works and the compromised web servers that are being used to host it.
After computers in Germany became infected with the notorious Conficker worm, 170 of them were disposed of and replaced with new equipment at the taxpayers' expense.
Wouldn't it have been easier (and cheaper) to have wiped the drives and restored from a backup?