Here’s the latest episode of our weekly “60 Second Security” video. It’ll only take a minute…![]()
Tag Archives: Cryptography
How to steal a million dollars (actually, $999,999.99) – no PIN required
Researchers at Newcastle University in the UK have come up with a surprising way of attacking contactless payments. The £20 safety limit for PINless transactions evaporates if payment is requested in a foreign currency, potentially opening the way to a $999,999.99 cup of coffee…![]()
GATSO! Speed camera phish leads to CryptoLocker ransomware clone…
Recently, we came across an intriguing phishing campaign that combines two feared products of the information age. Gatsos (speed cameras) and ransomware, rolled into one attack!![]()
Adobe updates its e-reader – DRM data no longer transmitted insecurely
Adobe’s e-reader software now has “enhanced security” for uploading metadata about what you read. Or, as you might say, “no longer uploads that data insecurely”…![]()
Do we really need strong passwords?
The idea that computer users should use long, complex passwords is one of computer security’s sacred cows. But is is really necessary? Mark Stockley investigates…![]()
Google goes beyond two-step verification with new USB Security Key
Google’s adding support for a physical USB second factor that will first verify the login site as being a true Google website, not a fake site pretending to be Google, before it hands over a cryptographic signature. ![]()
Apple pushes out iOS 8.1 – kills the mobile POODLE and closes some, ahem, “backdoors”
The marquee vulnerablity fixed in iOS 8.1 is, as you might expect, POODLE. But there are other cryptographic fixes in iOS 8.1 that are equally important…because cryptography is notoriously hard to get right first time.
![]()
FBI Director James Comey says Apple and Google go “too far” with default encryption
FBI Director James Comey says Apple and Google go too far with default encryption settings on mobile devices, including the iPhone 6 and Nexus 6 running on Android 5.0 Lollipop. Does the FBI really have a legal right to exploit encryption backdoors to pursue suspects?![]()
“Oops! I’m sorry about that” – 60 Sec Security [VIDEO]
Here it is – this week’s 60 Second Security video. News that will amuse, and it only takes a minute…![]()
POODLE attack takes bytes out of your enrypted data – here’s what to do
Heartbleed, Shellshock, Sandworm…and now POODLE. It’s a security hole that could let crooks read your encrypted web traffic. Paul Ducklin takes you through how it works, and what you can do to avoid it, in plain (well, plain-ish) English…![]()
