The Social Security Blogger Awards was held once again at RSA in San Francisco last week and Naked Security is proud to have taken home another trophy.
Chet and Duck say goodbye to San Francisco, thank their fellow bloggers for Naked Security winning the Best Corporate Security Blog, discuss their favorite stand and talk a bit about how "big data" plays with security.
If you work in IT, you’ve probably been here already. Someone important is proudly clutching a shiny new toy and asking you that vague, difficult question: "Can I use this?".
So how do you respond?
Where were you on March 6th 1992? Graham Cluley goes back in his time machine, and remembers the story of the biggest virus scare of all time - Michelangelo!
Did cybercrooks Trojanise a DDoS tool to take advantage of gullible supporters of Anonymous? Or is that just a wrong and libellous suggestion?
What do you expect when you download unknown software from an untrusted source on the say-so of an unidentified user?
Hacko Jacko! Two British men are alleged to have hacked Sony's network and made away with Michael Jackson's entire back catalogue, including unreleased recordings.
Infamous hacker Sabu is said to have betrayed his comrades in LulzSec and Anonymous, and have been working for the FBI for months.
Hector Xavier Monsegur has pleaded guilty to internet attacks, as others arrested on both sides of the Atlantic.
As regular Naked Security readers will know, I'm not usually given to marketroidistic endorsements, even of our own products. But in this case I couldn't resist it.
Our Astaro Secure Gateway 8.2 product took the crown for Best Email Security in the SC Magazine Awards at RSA 2012.
Hector Xavier Monsegur may have portrayed the exploits of Anonymous and LulzSec as a glamorous fight against "the man", but the dark criminal realities of their exploits were exposed in his indictment. It appears he wasn't just in it for the lulz.
Is Google really extending its online empire, and opening an online pharmacy?
Of course not. Don't click on the links, don't buy the goods, don't put your identity and health in danger.
A Russian security researcher has earned himself a tidy $60,000 by demonstrating how he could waltz past the security sandbox in Google's Chrome browser to run unauthorised code on fully-patched Windows 7 computers.