Android security fail, Cryptocat tartan, Nintendo crack - 60 Sec Security [VIDEO]

Filed Under: Android, Cryptography, Featured, Google, Privacy, Security threats, Video

Are cryptographic holes the new buffer overflow vulnerabilities?

Watch this week's 60 Second Security and let us know what you think!

→ Can't view the video on this page? Watch directly from YouTube. Can't hear the audio? Click on the Captions icon for closed captions.

Previous three episodes:

06 July 2013
29 June 2013
22 June 2013

In this episode:

  • Google's Android operating system has a security hole. A big one. You can tamper with other peoples' digitally-signed packages and Android won't notice.
  • We looked at one of the bugs in Cryptocat, an online app that's supposed to do secure IM via the web. Like Google's programmers, the Cryptocat coders missed the crypto boat a bit.
  • Crackers tried out 15 million passwords on Nintendo's site, and won out with 24,000 of them. Word on the street is the cracked passwords came from earlier breaches of people who re-use passwords between sites.

(If you enjoyed this video, you'll find plenty more on the SophosLabs YouTube channel.)

, , , , , , , , , , , , , , , , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Paul Ducklin is a passionate security proselytiser. (That's like an evangelist, but more so!) He lives and breathes computer security, and would be happy for you to do so, too. Paul won the inaugural AusCERT Director's Award for Individual Excellence in Computer Security in 2009. Follow him on Twitter: @duckblog