Why shouldn't you store unencrypted credit card numbers? How can you squeeze a positive result from a password breach? What sort of pressure was on the cryptanalysts at Bletchley Park?
Find out the answers in just one minute!
Blessed be Facebook for using this real-world example to 100% back up Naked Security when we proselytize about the evils of password reuse. And if you're worried that Facebook's mining of breached Adobe customer records and quarantining of users is Big Brother-ish, fear not: the company didn't have to store passwords in clear text or pull any other boneheaded security move to know just what its customers' reused passwords are.
A touch of fun but with a serious side - and only a minute to watch it.
Give our weekly "60 Second Security" video a whirl today...
Cloud-based database services company MongoHQ is in "we'd better fix things" mode this week, following a network intrusion that proves the old adage that once you've been breached, all security bets are off.
Google has once again found itself all over the IT news for a spot of bother with its security software.
A recent Google Authenticator update accidentally removed all your accounts...
Riot Games has confirmed that real names, usernames, email addresses and salted password hashes have been stolen in a recent security breach of its League of Legends real-time strategy game.
So many vulnerabilities are doom-and-gloom that you'd be forgiven for wondering if there are ever any at which you are allowed an uncomplicated chuckle.
The guys at Trustwave found one!
Lakeland has suffered a "sophisticated and sustained" attack in which two encrypted databases were accessed. It says it's found no evidence that data was stolen but has reset customers' passwords to be on the safe side.
Ubisoft is urging customers to change their passwords following a breach that exposed user names, email addresses and encrypted passwords.
If you use your iPhone or iPad as a Wi-Fi hotspot, don't let it generate the passphrase for you.
A posse of German computer scientists has found that Apple's iOS passphrase generator may give you less than a minute of security.
Last week Motorola execs showed off experimental biostamps - digital "tattoos" capable of authenticating you to your phone. Could this be the ultimate solution to the problem of authentication and passwords, or is it just a sci-fi pipe dream?
Vulnerability researchers at Core Security recently turned their attention on internet-enabled cameras, finding lots of holes.
And when security holes arise from features, not bugs, you really do feel like shouting aloud, "What WERE they thinking?"
After a widely publicised hack or data breach, you'll often find "password check" sites springing up.
Some of them are legitimate, but other password check sites are as bogus as they sound on the surface...