So far, the coverage of Anonymous' hack of American intelligence firm Stratfor has focused on the stolen credit cards and subscriber lists. But the real target was their email archives.
The Full Tilt
Stilgherrian delivers an undiluted dose of criticism and analysis of the ways digital technology is changing our world and the spin that goes with it.
Stilgherrian is a freelance journalist, commentator and podcaster interested in big-picture internet issues, especially security, cybercrime and hoovering up bulldust. He studied computing science and linguistics before a wide-ranging media career and a stint at running an IT business. He can write iptables firewall rules, set a rabbit trap, clear a jam in an IBM model 026 card punch and mix a mean whiskey sour.
Many of 2011's themes in IT were remarkably similar to those of 2010. It was a year of consolidation rather than breakthrough.
Stuxnet, cloud computing and advanced persistent threats (APTs) got the media coverage, but our experts focus on different security highlights.
Businesses face a risk when using customers' personal data, as those whose privacy credentials don't convince their customers will lose those customers.
Do you have the right to be anonymous online? If so, when? Anonymity protects Syrian political activists, internet trolls and criminals alike. There are no easy answers.
The US Stop Online Piracy Act (SOPA) is more than just the latest skirmish in the battle against online copyright infringement. It's another episode in the war on the internet itself.
Forget about Stuxnet, advanced persistent threats (APTs) and zero-day threats, says leading malware researcher Alex Kirk. Worry instead about everyday crimeware.
Bell Labs may have been absorbed into Alcatel-Lucent and ditched basic physics research, but it's still producing breakthroughs in optics, quantum computing and social computing.
Jon Callas has been at the centre of computer security since the olden days of the 1990s. On today's Patch Monday podcast he talks about the future. Cloud, smartphones, Android, the lot.
In just five years, malware construction kits will be so easy to use, and embedded processors will provide such easy targets, that a disgruntled paper boy might hack your refrigerator.
Identity theft is easy to commit, as Welsh comedian Bennett Arron discovered. He explains just how easy on this week's Patch Monday podcast.
Steve Jobs might now be known for such mainstream technology as the iPhone, iPad and Macintosh, but his first creation with hardware genius Steve Wozniak was illegal.
Adobe has taken a few security hits lately, from the Flashback Mac Trojan and another zero-day exploit in Flash Player to malware-laden PDF files being the hacker's weapon of choice. So what gives?
Cyberwar has been big news this year, from Stuxnet to claims that China has a massive cyber warfare capability. But what is it, exactly?
For a organisation that analyses 180,000 new malware samples every day, SophosLabs is a remarkably peaceful place. The fight against cybercrime is a well-rehearsed routine.