Author: Paul Ducklin
Cryptographic agility: the ability and the willingness to change quickly when needed.
Listen now - you'll be alarmed, amused and educated, all in equal measure. (Full transcript in article.)
If the crooks have connected up your phone number and your Twitter handle... what could go wrong?
It's serious, it's critical, and you could call it severe... but in HHGttG terminology, it's probably "mostly harmless".
The crooks now know who you are, where you live, which computers are yours, where you go online... and they got those password vaults, too.
Join world-renowned expert Fraser Howard, Director of Research at SophosLabs, for this fascinating episode on how to fight cybercrime.
A picture is worth 1024 words - we clicked through so you don't have to.
It happens to the best of us: Microsoft highlights a security bypass bug on Macs that is curiously similar to a recent Windows 0-day.
The Cryptoqueen herself is still missing, but her co-conspirator, who is said to have pocketed over $20m a month, has been convicted.
Return o' the rookit, super-sneaky wireless spyware, credit card skimming, and patches galore. Listen and learn!