Will the breach at eBay beat Adobe for size? Is Chip and PIN really as safe as they say? How many countries took action busting malware crooks? All the answers in 60 Sec Security for 24 May 2014…![]()
Tag Archives: Cryptography
SourceForge’s turn to reset passwords – this time in a good cause!
Hot on the heels of eBay’s password problems comes a password reset notification from SourceForge. The good news is that SourceForge’s reset is a *proactive* measure, not a reactive one.![]()
Chip-and-PIN should be “Chip-and-Skim,” say Cambridge card-cloners
Back in 2011, cryptographers at the University of Cambridge were approached by a man whose bank refused to refund a series of disputed transactions. So they set out to answer the question, “Is it reasonable to assume the infallibility of Chip-and-PIN transactions?”
![]()
Is Apple finally getting real about security? 60 Sec Security [VIDEO]
Where does the data breach buck stop? Why do they call them “secret” links? And is Apple finally getting real about security? Find out in “60 Second Security” for 10 May 2014
![]()
SSCC 146 – Target, Microsoft, Dropbox and the mysterious “Webdriver Torso” [PODCAST]
Have a listen to the latest episode of our weekly security podcast. Sophos security experts Chester Wisniewski and Paul Ducklin look at what we can learn from the latest news.![]()
Apple admits flaw in email attachment encryption on iPhones and iPads
Apple is under pressure once again to patch a security flaw in iOS 7, after a researcher published his discovery that email attachments are unencrypted on iPhones and iPads. Here’s why this is a big deal, and what you can do to stay protected.![]()
Dropbox stumbles over security and privacy of secret links
Another flaw in Dropbox was discovered this week. Users sharing documents using a secret link may have inadvertently been sharing the secret link with sites they linked to from shared files.![]()
Can we trust anyone with our personal info?
Two very different criminal cases have just concluded on opposite sides of the Atlantic, showing how vulnerable our personal information is. John Hawes explains why it’s not just the Target-type megabreaches that are cause for concern…![]()
Monday review – the hot 17 stories of the week
Catch up with everything we’ve written in the last seven days – it’s weekly roundup time.![]()
Weird and wonderful: the “Webdriver Torso” mystery videos explained – and remystified!
If you’re not up to speed with the latest in conspiracy theory, you need to know about the eerie YouTube sensation known as “Webdriver Torso”. We demystify the story; give you some tips on how to make your very own Webdriver Torso video; and ultimately remystify the whole thing…![]()
