Cybercrooks can buy hacked POS device and money-laundering bundle for $2,000
The bundles are one-stop shops for point of sale fraud, including a rigged reader, a network of grey merchants who'll transform ill-gotten goods into cash, and various purchase options. The only...
View ArticlePolice nab Argentinian teen who hacked money transfer and gambling websites
Argentinian police have arrested a teenager, dubbed "the superhacker", who was allegedly bleeding $50,000 (£31,500) per month out of international money transfer and gambling websites.
View ArticleInternet Explorer zero-day exploit prompts Microsoft to publish emergency Fix it
Microsoft has published an out of band security advisory for users of Internet Explorer to warn about a new zero-day attack being used in the wild. IE users are advised to use Microsoft's Fix it or...
View ArticleOne Direction fan serves up puppy purée in Twitter hoax
A One Direction Twitter troll played a puerile prank by threatening to purée her pets if the band didn't follow her on Twitter.
View ArticleWho is SophosLabs: Vincent Lynch, Senior Threat Researcher
SophosLabs is at the center of Sophos. It's the place where highly skilled experts in the field work round the clock to build protection from the latest threats. But what sort of people work there?
View ArticleJustin Bieber imposter jailed after tricking children into stripping in front...
A now-jailed paedophile posed online as Justin Bieber in order to trick children into stripping and performing sex acts in front of webcams - images that he then sometimes used to blackmail the children.
View ArticleHalf of Facebook-quitters leave over privacy concerns
Research from the University of Vienna has found that 48.3% of those who left Facebook did so because of concerns over privacy.
View ArticleFirefox 24 available now! 17 fixes, 7 critical
The Mozilla Foundation released Firefox, Thunderbird and SeaMonkey version 24.0, fixing 17 vulnerabilities.
View ArticleSophos Techknow - Understanding Vulnerabilities [PODCAST]
Make sense of vulnerability jargon by listening to this 15 minute podcast... With recent updates from Microsoft (three times), Adobe, Oracle, Apple and Firefox, the timing could scarcely be better.
View ArticlePhone and tablet unlocking - US government nudges it closer to law
US citizens are now one step closer to being able to do (more or less) what they want with their gadgets, as the government petitions the FCC to once again legalize wireless device unlocking.
View ArticleUS secret court publishes rationale for why spying on everybody is OK
The newly unveiled rationale has its roots in the old "you disclose your phone number to the phone company when you make a call" shtick. Swap "phone number" for "massive piles of metadata" and you get...
View ArticleUK to trial national emergency alerts via mobile phones - what are the risks?
The UK is to trial a national emergency alerting system based on text messaging to your mobile phone. Other countries have already done this, so it sounds uncontroversial - but can it be made to work...
View ArticleAhoy, me hearties! Check your almanacks, for today be Talk Like a Pirate Day,...
Talk like a pirate? Why does that matter? What's the point? To cheer up your IT staff, that's why! Here's the Naked Security Instant Expert Guide on how to do it...
View ArticleDefending against web-based malware: Spot the smoke, don’t wait for fire
Malware rarely gets into your network without some sort of tell-tale signs beforehand. Learning to spot the metaphorical smoke that precedes the fire of a malware infection is a handy metaphor for...
View ArticleFacebook “Likes” gain constitutional protection for US employees
Happy day, USA: When we click "Like" on Facebook, we are now constitutionally protected from getting fired! If you're thinking, "Well, duh, wasn't I already?", join the club.
View ArticleiOS 7 lockscreen hole discovered already – all your private photos could end...
Serial iOS bug finder "videosdebarraquito" has struck again. With some deft fingerwork, he can get into your photo gallery from the lockscreen and do pretty much what he wants with your images - such...
View ArticleFacebook apologizes for dating ads featuring photos of suicide victim
Rehtaeh Parsons killed herself after allegedly being gang-raped and suffering cyberbullying when photos of the alleged attack went viral. The dating company has since gone offline, and its Facebook...
View ArticleWin Bitcoins, booze and cash! Be the first to crack the iPhone’s Touch ID...
Numerous individuals have so far pledged Bitcoins, booze, cash, and more if you can clone someone's fingerprint and unlock an iPhone 5s. You're allowed to use your own fingerprint, to make...
View ArticleEuropean Commission calls for single privacy law in wake of PRISM snooping
The European Commission is hoping to restore trust and growth in the data-driven economy with new cross-national data protection laws.
View ArticleLinkedIn users sue over service’s “hacking” of contacts and spammy ways
Four users have filed a class action lawsuit over the way LinkedIn harvests email addresses without permission and then sends them marketing blurb.
View Article