How long would it take to crack your password?
Password policies are the enemy of security, the developer of a password analyzing tool concludes, while a vendor pushes it further to decree that password security is, basically, toast.
View ArticleMotorists warned of Dalek invasion by hacked road sign
First there was a warning that there were zombies on the road ahead.. Now it's the turn of the Daleks.
View ArticleSerco reports 123,000 US government employees' personal information stolen
Serco, a large international government services provider, disclosed a compromise of its systems that may have led to 123,000 people's Social Security Numbers and other sensitive details to be in the...
View ArticleTake a 666 chill pill: 'Barcode at birth' author was just joking
Science fiction writer Elizabeth Moon does *not* believe that all humans should be subcutaneously RFID chipped at birth.
View ArticleFlame worm - Iran claims to discover new Stuxnet-like malware
Iranian authorities claim to have discovered another targeted cyberattack against the country - the Flamer worm (also known as Flame).
View ArticleFlame malware - more details of targeted cyber attack in Middle East
Skywiper, Flame, Flamer - whatever you want to call it, this malware is making the headlines today. Find out more.
View ArticleSKA - no longer a troublesome mass-mailing computer virus
In computer security history, the word Ska is most notably associated with a widespread mass-mailing virus also known as Happy99. Happily, that association has recently been subsumed by an ambitious...
View ArticleBeware Remove your Facebook Timeline scams
Not everyone is a fan of Facebook's Timeline feature. And that's a fact of which spammers and scammers are happy to take advantage. Think before you install a browser plugin to hide your Facebook...
View ArticleFlame malware - The biggest? The baddest? A little perspective
Is Flame a big malware threat? Well, yes it is. But perhaps not in the way you think.
View ArticleSpying Trojan targets Iranian web surfers, dissidents
A proxy tool used by Iranian internet users to evade censorship and oppression is being distributed with a Trojan horse that can log their keystrokes and surfing habits reporting back their activities...
View ArticleOne weekend, one million jailbreakers - what should Apple do next?
Last weekend, Chronic Dev tweeted about the latest jailbreak tool for Apple's iDevices. In just two days, nearly one million people used it. With such clear minority interest in jailbreaking, what...
View ArticleNJ mayor and son arrested for hacking site criticising their administration
New Jersey town mayor was arrested on Thursday for allegedly hacking into a site that criticized his administration and intimidating individuals associated with it. You couldn't make this stuff up...
View ArticlePhishing with help from Google Docs
It's child's play to create a Google account, and use the Google Docs facility to host an online form. But scammers are exploiting Google Docs to phish for passwords and sensitive information.
View ArticleAnatomy of an Attack comes to San Diego, Santa Fe, Toronto and Indianapolis
Sophos is hosting events in San Diego, Santa Fe, Toronto and Indianapolis in the next few weeks where our experts will explain how malware threats actually work and what you can do to protect your...
View ArticleRun a Facebook page with other admins? You need to read this
Facebook introduces new roles for page administrators - helping you avoid having your Facebook page hijacked.
View ArticleEmployers on track to get more nosey with employees' social media lives
By 2015, 60% of employers are likely to be eavesdropping on our social media selves to make sure our e-blabbing isn't poking security holes into their outfits, according to a recent report.
View ArticleHotel booking confirmation emails aim to infect your computer. Watch out!
Be on your guard against emails that claim to be about a hotel booking that you never made - you could be putting your computer at risk of infection by malware.
View ArticleHow to teach tomorrow's doctors about social media privacy
Social media and health care privacy may not mix well, but telling the trainees who have grown up with social media to simply "abstain – or else!" doesn't help students structure their behaviours in...
View ArticleEx-MI5 boss loses laptop at Heathrow airport
Stella Rimington, the former Director-General of MI5 has had her laptop stolen after landing at Heathrow airport. Is the data on your laptop properly secured?
View ArticleStuxnet: How USA and Israel created anti-Iran virus, and then lost control of it
The Stuxnet virus was created by the USA to target an Iranian nuclear facility, but accidentally escaped into the wider world, claims the New York Times.
View Article