(get it in RSS or Atom)

A virus on a *Mac*? Is NOTHING sacred? [Chet Chat Podcast 211]

The latest episode of our weekly security podcast - a quarter-hour of news with attitude! Enjoy.

Update Tuesday, Firefox's zero-day, more Android bugginess, a firmware virus for your Mac ...and a tax fraudster busted.

Is Stagefright over yet? 60 Sec Security [VIDEO]

Here's the latest episode of our weekly 1-minute security video - enjoy.

Malware on Linux - When Penguins Attack

If you really want to fan the flames of controversy, ask the question, "What about malware on Linux?"

We's what we found out.

5 tips to improve your Linux desktop security


Linux-based operating systems aren't invulnerable.

Here are five easy steps you can take to enhance your Linux security...

Get into Infosec Europe 2015 for free, hear great talks!


Get a free pass to Infosec Europe (2/3/4 June 2015) and stop by at our stand to say hello.

Attend our free paid actors, no sales pitches and no canned product demos: we're giving educational presentations that we hope will both entertain and educate.

What a lot of patches! 60 Sec Security [VIDEO]

Watch the latest episode of our weekly fun-but-serious security news video.

It only takes a minute!

Linux Australia gets pwned, rooted, RATted and botted

Linux Australia had a bit of a nightmare Easter Weekend.

While the rest of us were loafing at the beach, the Penguinistas from Down Under were owning up to a pretty extensive cyberintrusion.

SSCC 184 - What's the lifespan of a GHOST? [PODCAST]

Our weekly security podcast - the latest news in 15 minutes, entertaining *and* educational.


The GHOST in the machine - 60 Sec Security [VIDEO]

Here's our weekly one-minute security video.

Sending spam, cracking the Blackphone and the GHOST in the machine. Enjoy...

The GHOST vulnerability - what you need to know


The funkily-named bug of the week is GHOST.

Here's how it got its name, why there's a problem, and what you can do about it...

From Facebook, through iPhones and Androids, to Macs - make the safest start to 2015!

Are you looking to turn over a new security leaf yourself in 2015, or trying to convince your friends and family to do so?

Here are some great places to start...

Are you tired of weak or fake zero-day exploits? 60 Sec Security [VIDEO]

Watch our latest 60 Second Security video!

An entertaining but insightful look at the week's security woes - in just one minute...

Linux "got root" kernel bug patched after five years at large


Here's a kernel bug in Linux that turned out to have been sitting there, Heartbleed style, awaiting discovery and exploitation for several years.

Paul Ducklin digs in...

Monday review - the hot 26 stories of the week


Make sure you're up to date with everything we wrote in the last seven days - it's weekly roundup time.

FTC slapdown, no iPhone for Mr President, and Dutch banks get tough - 60 Sec Security [VIDEO]

How could the brightest flashlight leave you in the dark? Do you need to close Joel's Backdoor? Why can't the President choose his own phone? Should you update your anti-virus before you bank online?

Find out in 60 Second Security!

Have you heard of the Happy Hour virus?


Created by an advertising agency in Boulder, Colorado, the web-borne Happy Hour Virus lets you deliberately simulate a security problem in order to leave work early.

Paul Ducklin stayed back late to take a look...

Chrome support for XP to continue after Microsoft ditches it - helpful, or dangerous?

Chrome support for XP to continue after Microsoft ditches it - helpful, or dangerous?

Google has pledged to continue supporting its Chrome browser on Windows XP until at least April 2015, a full year after Microsoft officially ends support for the legacy platform in April 2014. But could its decision end up dissuading people from moving away from XP in a prompt and timely manner?

Infecting iOS, OpenX backdoor, toilet hole, Android malware - 60 Sec Security [VIDEO]


Are Apple's iPhones really impervious to malware? What do you do if your software is pre-infected with a backdoor? What strength of password is appropriate for a toilet? And what about firmware updates for the Android code verification holes? Find out more in 60 seconds!

Lifting the lid on the Redkit exploit kit

In the first of a two part series, Fraser Howard takes a closer look at the Redkit exploit kit.

Learn more about how this kit works and the compromised web servers that are being used to host it.