Koppie Koppie sells photos of your kids to prove you shouldn't post them online
Two "privacy advocates" running an online store that sells mugs printed with pictures of children are intentionally stirring up controversy by grabbing photos from Flickr. The duo behind Koppie Koppie...
View ArticleSSCC 187 - The cryptography edition [PODCAST]
Sophos expert John Shier sits in for regular presenter Chester Wisniewski in this episode. John and Paul Ducklin dissect the latest security issues, which were dominated this week by some thorny...
View ArticleHow nine out of ten healthcare pages leak private data
A recent study has shown that nine out of ten visits to health-related web pages result in data being leaked to third parties like Google, Facebook and Experian. That's not new, so why do we care now?...
View ArticleBarclays to launch Twitter payments through Pingit mobile app
A new service from Barclays bank will allow its 'Pingit' users to send money to each other over Twitter.
View ArticleAnthem healthcare breach is smaller - and bigger - than first thought
There's good and bad news about Anthem's recent data breach. The bad news includes the risk to between 8.8M and 18M non-customers who were in Anthem's database anyway...
View ArticleSay hello to net neutrality - FCC votes to "protect the open internet"
The FCC has voted in favor of net neutrality. Broadband is now a US public utility, free of blocking, throttling or paid prioritization, and also subject to greater government regulation.
View ArticleFacebook comes up with new ways to reach out to the suicidal
Where would you turn, and what would you do, if you saw a post that seemed suicidal from a Facebook friend? Facebook has some answers.
View ArticleEuropol takedown of Ramnit botnet frees 3.2 million PCs from cybercriminals'...
In an international operation coordinated with multiple law enforcement and industry partners, Europol led a takedown of the infrastructure of the Ramnit botnet that infected 3.2 million Windows...
View ArticleFacebook Bug Bounty report for 2014: $1.3M paid out to more than 700 bug finders
Facebook just released details of how much it paid out in bug bounties for 2014. Rewards ranged from $500 to over $50,000...
View ArticleRIP Leonard Nimoy: a hero to Trekkies, but so much more than "Spock"
Leonard Nimoy was beloved by millions, including many of us at Naked Security and at Sophos. So it is with great sadness that we acknowledge his passing on Friday, at the age of 83, and offer this...
View ArticleBought PII from the government? PLEASE DON'T LOSE IT! 60 Sec Security [VIDEO]
Here's the latest episode of our weekly computer security roundup. The latest news presented so you can enjoy it...in just one minute!
View ArticleMonday review - the hot 26 stories of the week
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.
View ArticleOld-school landline phones to protect elderly from "it's me" scammers
The new phones glow red when a call comes in from an unregistered number, to battle the "ore ore" ("it's me, it's me") fraudsters who prey on Japanese elderly.
View ArticleCraig Brittain asks Google to remove links relating to his revenge porn antics
The guy who ignored women's pleas to take down nude images from his IsAnybodyDown site wants to have his own photos and information expunged from Google.
View ArticleAnatomy of a certificate problem - Comodo's "PrivDog" software in the spotlight
The bug's now fixed, but when a Certificate Authority offers you software to make your secure web transactions even more secure... ...you don't expect it to work the other way around!
View ArticleGoogle performs U-turn on Blogger smut rule
Google has changed its mind over a new policy on sexually explicit content on its Blogger platform and will target commercial porn instead.
View ArticleWhy you can't trust password strength meters
Website owners can employ a range of measures to help users choose better, stronger passwords and one of the most popular techniques is to include a password strength meter. The meters are designed to...
View Article5 mobile device risks in your business
5 security risks that you need to get on top of before you let employees access corporate resources from mobile devices, and how to mitigate them.
View ArticlePlease vote for Naked Security in the 2015 Security Blogger Awards!
Along with the RSA 2015 conference in San Francisco in April come the Security Blogger Awards. We're shortlisted, so please vote for us!
View ArticleUber subpoenas GitHub in search for hacker of driver database
A breach of one of its databases in May 2014, in which the names and driver license numbers of 50,000 "driver partners" were stolen, is the latest entry on Uber's growing list privacy and security...
View Article