Profile

Cover photo
4,278 followers|2,038,980 views
AboutPostsPhotosVideos

Stream

Naked Security

Shared publicly  - 
 
If only we could erase our own memories of the embarrassing things we did...
A new children's privacy rights campaign has attracted backing from ministers, business leaders and academics.
1
Walter Johnson's profile photo
 
Totally. I forget my children ALL the time. 
Add a comment...

Naked Security

Shared publicly  - 
 
The signatories include hundreds of AI researchers and big names from the fields of science, technology and engineering.
Hundreds of Artificial Intelligence experts have signed an open letter warning that pushing ahead with AI weapons will lead to an arms race that puts the technology in the hands of every army, terr...
2
1
Paul Gray's profile photoBert Knabe's profile photo
5 comments
 
+Paul Gray Yes, anything can be a weapon. But I think people will always balk at the idea of a weapon designed to operate itself, even with a kill switch. Especially when you throw terms like AI in. Intelligence implies the possibility of figuring out how to override or disable the kill switch, at least to most people. Actually, most people probably assume human-like intelligence when they here "artificial intelligence" even though that isn't the case - yet, anyway.
Add a comment...

Naked Security

Shared publicly  - 
 
Linux servers provide the bulk of the ecosystem that crooks use to deliver the bad stuff to Windows victims...we explain the what/why/how (and what to do about it).
If you really want to fan the flames of controversy, ask the question, "What about malware on Linux?" We asked...here's what we found out.
1
2
Tom Gatermann's profile photoBert Knabe's profile photo
Add a comment...

Naked Security

Shared publicly  - 
 
Headline says it all.
Here's what you can do to deal with the much-talked-up "Stagefright" messaging vulnerability on Android
1
2
David Schotka's profile photoRhys Jones's profile photo
Add a comment...

Naked Security

Shared publicly  - 
 
50 Cent said he posted the video to get back at a rival rapper who was "disrespecting" him.
That works out to bit more than $1 per viewing by the millions who'd seen the involuntary porn as of January 2014.
1
1
Bert Knabe's profile photo
Add a comment...

Naked Security

Shared publicly  - 
 
Owens apparently used at least five Dark Web drug hangouts: Silk Road 2, Agora, Onion shop, Evolution and Sheep.
He was an online dealer who made use of the so-called Dark Web, shielded by the apparent anonymity of Tor, or The Onion Router. He's not anonymous any more.
2
Add a comment...
In their circles
6 people
Have them in circles
4,278 people
Nanjing IOT Sensor Technology Co.,Ltd's profile photo
Justin Christian's profile photo
Jeffrey Task's profile photo
Wm Tilson's profile photo
Sharad D's profile photo
Mido yousef's profile photo
John's Gardening Services's profile photo
Robert Adrin Bogdan's profile photo
Computer Systems Center Incorporated (CSCI)'s profile photo

Naked Security

Shared publicly  - 
 
The date: 29 November 2015.
Phone companies take over the records on 29 November, but NSA's tech staff will have another three months "solely" to ensure data integrity.
2
1
Ivan Medina's profile photo
Add a comment...

Naked Security

Shared publicly  - 
 
Windows 10 is out today. Do you want to be the master of your own destiny when it comes to patches?
What does the wording about updates being "available automatically" in the Windows 10 Specifications really mean?
3
2
Kim Halavakoski's profile photoEd's Computer Solutions's profile photo
Add a comment...

Naked Security

Shared publicly  - 
 
The Apple vulnerability posed "a significant risk to buyers, sellers or Apple website managers/developers".
The vulnerability posed "a significant risk to buyers, sellers or Apple website managers/developers".
1
1
Bert Knabe's profile photo
Add a comment...

Naked Security

Shared publicly  - 
 
Self-destructing emails? (Don't get too excited, the reviews aren't that great.)
After an email has been "destroyed" (or, rather, encrypted), recipients will see a message that the email has been killed. Should we trust it will do what it says with personal data?
1
1
Juergen Nieveler's profile photoDean Ritts's profile photo
 
As long as screenshots exist, self-destructing mail won't work 
Add a comment...

Naked Security

Shared publicly  - 
 
Attackers could have taken over an account even if they only knew their target's Steam ID - something that is hardly a secret on the platform.
Valve has plugged a vulnerability which saw a number of accounts on its Steam gaming platform hijacked last week.
8
5
Joe Bower's profile photoKerry Amburgy-Dickson (Kalex)'s profile photo
Add a comment...

Naked Security

Shared publicly  - 
 
Seen something funny on Twitter that's worth reweeting? You better make sure you credit the original source...
Ripping off other people's stuff, even jokes, is no laughing matter!
4
Add a comment...
People
In their circles
6 people
Have them in circles
4,278 people
Nanjing IOT Sensor Technology Co.,Ltd's profile photo
Justin Christian's profile photo
Jeffrey Task's profile photo
Wm Tilson's profile photo
Sharad D's profile photo
Mido yousef's profile photo
John's Gardening Services's profile photo
Robert Adrin Bogdan's profile photo
Computer Systems Center Incorporated (CSCI)'s profile photo
Contact Information
Contact info
Email
Story
Tagline
Computer security news, opinion, advice and research from Sophos
Introduction
Computer security news from Sophos.

Visit http://nakedsecurity.sophos.com for more information