Skype protocol cracked - what happens next?
A chap by the name of Efim Bushmanov has just published a claim that he has reverse-engineered the Skype protocol. But how did he do it? And will the lawyers take it from here?
View ArticleIT security - what you must know in the mobile era
Worried about the cloud? Data breaches? Mobile devices? Identity theft? Join presenter James Kirby and experts Stephen Wilson, Charis Palmer and (ahem) me as we talk on the subject of IT security -...
View ArticleSecurity breach: Kernel.org and Linux Foundation remain "temporarily...
The Linux world is in a bit of a security spinout at the moment. Could this be the moment that you finally decide to try OpenBSD?
View ArticleApple fakery, DNS hack, DigiNotar, Linux, Wikileaks - 60 Sec Security
Lots of readers said they'd like to see our 'news-with-a-conscience' videos more than once a month. So here you go. 60 Second Security, once every two weeks.
View ArticleWelcome back, Linux kernel!
Just under a month ago, the official distribution site for the Linux kernel was taken offline following an embarrasing malware incident. The good news is that kernel.org is back online. It's not all...
View ArticleFLAMING RETORT: All this new Mac malware - whose fault is it?
Flaming Retort is back, this time trying to Coole and Explayne the flames we've had from some Mac users in the past few days. In a back-to-front way of making Mac fans feel better, I'll start by making...
View ArticleMulti-platform backdoor malware targets Windows, Mac and Linux users
A web-based malware attack has been discovered, targeting users of Windows, Mac and Linux. Although the amount of malware written for different operating systems can vary, it's becoming increasingly...
View ArticleSophos Techknow - All about Java
Java brings with it some significant risks, yet for many people, it's "just there on my computer." In this episode, Duck and Chet tell you All about Java, and help you to make an informed decision in...
View ArticleUbuntu pipes search queries to Amazon, worrying privacy experts
Revolution OS - or adware? An update to the popular Ubuntu Linux distribution will pass searches through Amazon.com's search engine. Now the Electronic Frontier Foundation calls that move a "major...
View ArticleFLAMING RETORT: Linux rootkit news "provides some comic relief"
About two weeks ago, a posting on the Full Disclosure Mailing List announced a new Linux rootkit. Indeed, the posting didn't just announce the malware, but included a fully-working sample...
View ArticleHow do you compare to Steve Wozniak? Take our survey and (maybe) win a new...
Last year, Apple co-founder Steve Wozniak showed off his travel backpack to Gizmodo readers. He needed a whopping seven containers to get through airport security! Question is how do the rest of us...
View ArticleRogue Apache modules pushing iFrame injections which drive traffic to...
SophosLabs has seen huge volumes of legitimate sites being compromised with malicious redirects in recent weeks. Fraser Howard explains what's going on, and how the compromised web servers are almost...
View ArticleAdobe tells Windows and Mac users to install critical security updates for...
Computer users should be getting used to security updates for Adobe Flash by now - after all, this is the fourth in as many weeks. Make sure your computers are protected as soon as possible.
View ArticleINFOGRAPHIC: Users weighed down by multiple gadgets - survey reveals the most...
Just how many devices does the average person carry on them? Which country loves their laptops? And who will come out on top - iPhone or Android? See what our survey says about your most favorite gadgets.
View ArticleLifting the lid on the Redkit exploit kit
In the first of a two part series, Fraser Howard takes a closer look at the Redkit exploit kit. Learn more about how this kit works and the compromised web servers that are being used to host it.
View ArticleInfecting iOS, OpenX backdoor, toilet hole, Android malware - 60 Sec Security...
Are Apple's iPhones really impervious to malware? What do you do if your software is pre-infected with a backdoor? What strength of password is appropriate for a toilet? And what about firmware updates...
View ArticleChrome support for XP to continue after Microsoft ditches it - helpful, or...
Google has pledged to continue supporting its Chrome browser on Windows XP until at least April 2015, a full year after Microsoft officially ends support for the legacy platform in April 2014. But...
View ArticleHave you heard of the Happy Hour virus?
Created by an advertising agency in Boulder, Colorado, the web-borne Happy Hour Virus lets you deliberately simulate a security problem in order to leave work early. Paul Ducklin stayed back late to...
View ArticleFTC slapdown, no iPhone for Mr President, and Dutch banks get tough - 60 Sec...
How could the brightest flashlight leave you in the dark? Do you need to close Joel's Backdoor? Why can't the President choose his own phone? Should you update your anti-virus before you bank online?...
View ArticleMonday review - the hot 26 stories of the week
Make sure you're up to date with everything we wrote in the last seven days - it's weekly roundup time.
View Article
More Pages to Explore .....