Chip-and-PIN should be “Chip-and-Skim,” say Cambridge card-cloners

Back in 2011, cryptographers at the University of Cambridge were approached by a man whose bank refused to refund a series of disputed transactions. So they set out to answer the question, “Is it reasonable to assume the infallibility of Chip-and-PIN transactions?”

US charges Chinese military officers with cyber espionage

Tensions between China and the United States over spying go back a long way. But – in a first – the US has indicted five Chinese military officials for alleged cyber espionage, which could ratchet up the tension to a new level.

SSCC 147 – Why Snapchat will have to tell you the truth about security now [PODCAST]

As usual, Chester Wisniewski and Paul Ducklin turn their insightful and entertaining gaze on the security lessons we can learn from the past few days. Give it a listen – it’s our weekly quarter-hour security podcast…

“Open the iPhone door, Siri!” – Apple’s digital helper coughs up another lock screen hole

A hacker has found a way to bypass the iPhone 5 lock screen to get at your contacts. Ironically, he got in by asking Siri, Apple’s voice-activated “helper.” Here’s how to close the hole while you wait for Apple’s fix…

US Navy sailor allegedly led team that hacked government computers

A US Navy systems administrator stationed on the nuclear aircraft carrier USS Harry S. Truman acted as ringleader for a gang of anti-government cyber crooks, prosecutors alleged last week.

Monday review – the hot 21 stories of the week

It’s weekly roundup time! Here’s all the great stuff we’ve written in the past seven days.

Is Apple finally getting real about security? 60 Sec Security [VIDEO]

Where does the data breach buck stop? Why do they call them “secret” links? And is Apple finally getting real about security? Find out in “60 Second Security” for 10 May 2014