Most hackers for hire are scammers, research shows

Google & UC San Diego researchers found that only 5 of 27 hacker-for-hire services actually launched attacks against their targets.

Sneaky phishing campaign beats two-factor authentication

Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesn’t mean every method for doing this is equally secure.

Why Yahoo scanning user email is no cause for panic

The Wall Street Journal yesterday published an unsettling report that the owner of Yahoo, Verizon subsidiary Oath, has been quietly analysing the emails of its 200 million users to sell to advertisers.

Could this be the end of password re-use?

It’s password security’s Achilles heel: too many people make life easy for cybercriminals by re-using the same ones over and over. But what if there were a way for websites to compare notes on whether a password (or similar password) has been set by a user elsewhere?

What would YOU do with a $1,000,000 exploit? [Chet Chat Podcast 220]

Here’s the past week’s news in a way that’s fun, informative and educational – all in a tight, quarter-hour podcast format. (Plus – find out what Chester would do with the $1m!)