Monday review - the hot 21 stories of the week

Filed Under: Adobe, Celebrities, Cryptography, Data loss, Featured, Google, iOS, Java, Law & order, Malware, Microsoft, Oracle, Security threats, Vulnerability

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

General interest

Probably the best 15 minute security podcast of the day

Cryptography

Mega's bug bounty - "a few billion billion years" to go

Hacking and scams

Pope to resign - Twitter sex spammers exploit story

"STOP CONTACTING THOSE B*!%£RDS"

Hacked TV channels broadcast zombie apocalypse alert

Jawbone accounts compromised by hackers

Facebook owns up to network breach, blames Java in browser

Law and order

Reveton ransomware gang arrested by Spanish police

Malware and exploits

Malware injected into legit JavaScript on legit websites

Anatomy of a targeted attack - an Adobe 0-day "experiment"

More Mac malware attacking minority groups in China

Point-of-Sale malware attacks – no business too small

Mobile devices

Was Alicia Keys hacked, or is she cheating on BlackBerry?

Unlock an iPhone without the passcode

OS and software

VMWare security hole - it sounds like you need the patch

Monster super-critical Patch Tuesday for February 2013

Oracle on Java - we *will* have Patch Tuesday after all

Adobe investigates PDF Reader zero-day vulnerability reports

Adobe PDF exploit workaround, but not for Mac or Linux

Privacy and online safety

Ex-President Bush doxed - personal information leaked

Bizarre Google search bug benefits porn websites

Would you like to keep up with all the stories we write? Why not sign up for our daily newsletter to make sure you don't miss anything? You can easily unsubscribe if you decide you no longer want it.

Days of the week image from Shutterstock.

, , , , , , , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Anna Brading is Naked Security's editor. She has worked in tech for more than ten years and as a writer with Sophos for over five. She's interested in social media, privacy and keeping people safe online.