Following our popular article explaining what Adobe did wrong with its users' passwords, a number of readers asked us, "Why not publish an article showing the rest of us how to do it right?"
Here you are...
Blessed be Facebook for using this real-world example to 100% back up Naked Security when we proselytize about the evils of password reuse. And if you're worried that Facebook's mining of breached Adobe customer records and quarantining of users is Big Brother-ish, fear not: the company didn't have to store passwords in clear text or pull any other boneheaded security move to know just what its customers' reused passwords are.
Learn how cryptanalysts think, and why cryptographers feel such terrible dismay when companies that really ought to know better make mammoth mistakes.
Paul Ducklin deconstructs the data leaked in Adobe's latest megabreach...
How safe is the SIM in your mobile phone? Could it be remotely infected with malware?
Possibly - watch this week's 60 Second Security video and find out more!
Ubisoft is urging customers to change their passwords following a breach that exposed user names, email addresses and encrypted passwords.
San Francisco-based document sharing site Scribd has admitted to a network intrusion.
Details are scant, but fortunately a notification published by the company suggests that no more than 1% of users are at risk...
Why, and more importantly, *how*, would you go about weeding out rude passwords?
Surely an April Fool?
Paul Ducklin takes a look...
An allegedly Egyptian hacker going by the name ViruS_HimA has allegedly hacked into Adobe.
Wherever the data actually comes from, it reveals yet more poor password hygiene at both the client and the server...find out just how bad.
Online real-time strategy game League of Legends, from Riot Games, is the latest large web property to own up to a data breach.
There's a silver lining, namely that the company's notification is frank and helpful, stating clearly what was stolen, and what wasn't.