Quantum hackers have recently succeeded in breaking a number of quantum key distribution schemes. The attacks exploit "features" of the implementations, which are not described accurately by the theoretical models used for their security proofs. A closer look at these models indeed reveals that they do not match reality. They are often based on unrealistic assumptions, e.g., that all devices are free from defects and that arbitrarily many signals can be exchanged. In order to overcome this situation, theoreticians have started devising novel security proofs, which are more practical. In my talk, I will review recent progress in this endeavor.