Are Apple’s iPhones really impervious to malware attack? What do you do if your software ends up pre-infected with a backdoor? What strength of password is appropriate for a toilet? And when will we get firmware updates for the Android code verification holes?
Watch this week’s 60 Second Security and find out more!
→ Can’t view the video on this page? Watch directly from YouTube. Can’t hear the audio? Click on the Captions icon for closed captions.
Previous three episodes:
03 Aug 2013
27 July 2013
20 July 2013
In this episode:
- Apple’s iDevices can be infected with malware via the USB port by a diguised charger.
- The official download of OpenX’s ad server had a backdoor implanted for months.
- A Japanese company had a password vulnerability in an Android app that can flush your toilet. (Really.)
- Android’s “Master Key” vulnerability is actively being used by cybercriminals to build sneaky malware.
(If you enjoyed this video, you’ll find plenty more on the SophosLabs YouTube channel.)