Monday review - the hot 20 stories of the week

Filed Under: Apple, Botnet, Cryptography, Data loss, Facebook, iOS, Law & order, Malware, SophosLabs, Spam, Twitter, Vulnerability

Get up to date with everything we wrote in the past seven days - it's weekly roundup time.

General interest

CERN Geneva celebrates 20 years of the World Wide Web

Would you let a spammer give you a root canal? Sure you would!

Apple iMessage "censors" mention of Obama: international conspiracy...or software bug?

Hacking and scams

Reputation.com resets all user passwords following breach

Law and order

Revenge-porn website victim files suit against ex and four porn sites

US seeks to pressure Google, Facebook et al. into installing wiretapping backdoors

Thieves may have used GPS to track burglary victim

Malware and exploits

Lifting the lid on the Redkit exploit kit (Part 1)

Network gaming company uses its "cheat-prevention" client to build a Bitcoin botnet

US Department of Labor website hacked, serves malware, now fixed

German ministry replaced brand new PCs infected with Conficker worm, rather than disinfect them

What WERE they thinking? Internet-enabled cameras under the security lens once again

"Wire transfer canceled"? Watch out for spammed-out malware attack

Social networks

Facebook introduces Trusted Contacts, makes you ask, "How much do I trust my friends?"

Troll admits to making death threats against children on Facebook

Guardian Twitter accounts hacked by the Syrian Electronic Army

Cryptography

IBM takes a big new step in cryptography: practical homomorphic encryption

Beware of encryption companies bearing gifts!

OS and software

Apple ships jolly uninteresting iOS 6.1.4 update

Privacy and online safety

How to rate a comparative anti-virus test - a six-step guide

Would you like to keep up with all the stories we write? Why not sign up for our daily newsletter to make sure you don't miss anything. You can easily unsubscribe if you decide you no longer want it.

Days of the week image from Shutterstock.

, , , , , , , , , , , , , , , , , , , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Anna Brading has worked in tech for more than ten years and as a writer with Sophos for over five. She's interested in social media, privacy, and stopping people doing silly things online.