The FREAK bug affects TLS/SSL, the security protocol that puts the S into HTTPS and the padlock in your browser’s address bar. Paul Ducklin explains in plain English…![]()
Tag Archives: Featured
Google quietly drops promised encryption by default for Android Lollipop
Google has confirmed reports: that sweet encryption-by-default it promised for Android Lollipop left a sour taste when it came to device performance. ![]()
Police may charge data centre in largest ever child abuse images bust
Police might press charges against the owner of the drives that hold the child abuse image material – most likely, an Ontario data centre that houses the files.![]()
Venmo mobile payment service under fire for security carelessness
Venmo is taking heat after a news report last week revealed security holes you could “drive a truck through,” in the words of one aggrieved Venmo user whose account was drained of $2850.![]()
Facebook explains when and why it peeps at your account
A Facebook engineer asked if it would be OK to take a look at Paavo Siljamäki’s profile. Sure, he said. Then he wondered: how many employees can get in without credentials?![]()
Is this the ultimate spam fail?
We’re not sure whether we ought to laugh at cybercrime. But sometimes you just have to smile at the antics of would-be cybercriminals.![]()
Woman reunited with stolen iPhone thanks to accidental Facebook selfie post
A woman and her iPhone have been happily reunited, thanks to the new owner having accidentally posted a selfie onto her Facebook page that went viral.![]()
Uber subpoenas GitHub in search for hacker of driver database
A breach of one of its databases in May 2014, in which the names and driver license numbers of 50,000 “driver partners” were stolen, is the latest entry on Uber’s growing list privacy and security blunders.![]()
Please vote for Naked Security in the 2015 Security Blogger Awards!
Along with the RSA 2015 conference in San Francisco in April come the Security Blogger Awards. We’re shortlisted, so please vote for us!![]()
5 mobile device risks in your business
5 security risks that you need to get on top of before you let employees access corporate resources from mobile devices, and how to mitigate them.![]()
