You won't believe how crazy this password infomercial is (and neither did...
When there's nothing funny on American TV, you can always rely upon an infomerical selling some crazy product to have you chuckling or simply agog in disbelief that anyone would ever buy such a thing....
View ArticleAnatomy of a phish - how to spot a Man-in-the-Middle attack, and other...
Even if you are used to phishing scams, it still pays to take the occasional look at a scam campaign, just to remind yourself not to let your guard down. Paul Ducklin digs into a recent "tax refund"...
View Article8 tips for a security incident handling plan
Most of us know that there is no such thing as 100% security, and that - unfortunately - it's only a matter of time until a security incident occurs. It's a vast topic, but here are 8 tips that you can...
View ArticleHosting company Hostgator hacked, suspect arrested after being "rooted with...
A former system administrator from hosting company Hostgator has been arrested for hacking into his former employer's network. There's some poetic justice in how he was identified and connected with...
View ArticleGoodbye to spam, er, @spam, on Twitter...
Twitter and its users have perennial problems with spam, as a quick search of Naked Security will reveal. So you might be surprised that the micro-blogging site's own Twitter identity for reporting...
View ArticleMonday review – the hot 22 stories of the week
In case you missed any recent stories, here's everything we wrote in the last seven days.
View ArticleXKCD cartoon reminds users to log out for better security
It's disturbing just how many people seem to leave their computers permanently logged in to online services. An XKCD cartoon teaches us all an important security lesson.
View ArticleTwitter plays cat-and-mouse with hackers of the Syrian Electronic Army
Twitter's security team appears to be playing whack-a-mole with a group of hackers who have made a name for themselves hijacking the accounts of high profile media organisations.
View ArticleWhy facial recognition couldn't identify Boston bombing suspects
We have TV-inspired ideas of what facial recognition technology can do, but the reality is that it's far less useful than depicted on shows like "Homeland".
View ArticleSSCC 107 - Hostgator, Safari, Java, pwning planes with Android, and Facebook...
Here's the latest episode in the popular "Chet Chat" series. Join Chet and Duck as they discuss what we can learn from recent security news in this quarter-hour podcast.
View ArticleYet another unpatched security hole found in Java
Just last week you were congratulating yourself for patching your computer against a Java security hole. Now another zero-day unpatched vulnerability has been found in Oracle's widely used software.
View Article55% of net users use the same password for most, if not all, websites. When...
A study by Ofcom, the UK communications watchdog, has unearthed some appalling statistics which reveal just how badly the general public treat password security.
View ArticleNaked Security scoops top honours at European Security Blogger Awards
Fellow writers Graham Cluley and Chester Wisniewski just emailed from the European Security Blogger Awards in Earls Court, London. We're pleased to report that Naked Security picked up two awards,...
View ArticleAssociated Press Twitter hack spreads fake White House bomb story, pushes...
With just under two million followers, AP's Twitter account has a wide reach, and is influential. Influential enough, it seems, that a false rumour from the AP feed can have a visible affect on the...
View ArticleBeware Twitter "password check" sites - there are fakes, and there are fake...
After a widely publicised hack or data breach, you'll often find "password check" sites springing up. Some of them are legitimate, but other password check sites are as bogus as they sound on the...
View ArticleViber flaw bypasses lock screen to give full access to Androids
Security researchers have identified a security hole in Viber that can be exploited to bypass Android smartphones' lock screen and gain full access to the device.
View ArticleFormer Reuters editor Matthew Keys pleads not guilty to giving logins to...
US federal prosecutors claim that journalist Matthew Keys handed over login credentials for his former employer, Los Angeles Times' parent company, Tribune Company. Keys' defense says it was the work...
View ArticleNew incoming fax message is actually malware - be on your guard!
Computer users are warned to be on the lookout for messages in their email inbox, claiming to be an incoming fax.
View ArticleThe Redkit malware exploit gang has a message for security blogger Brian Krebs
Award-winning security blogger Brian Krebs is loved by everyone on the internet... apart from the criminals. Find out what they're saying about him in their latest version of the Redkit exploit kit.
View Article"Government seeks a warrant to hack" - US judge gives his decision
Do you usually shy away from legal documents? Well, here's one that's well worth reading: it deals very interestingly with the zone in which busting cybercrooks and protecting privacy intersect...
View Article