Monday review - the hot 20 stories of the week

Filed Under: Android, Cryptography, Data loss, Facebook, Google, Law & order, Microsoft, Privacy, Security threats, Social networks, Vulnerability, Web Browsers

It's weekly roundup time!

Here's all the great stuff we've written in the past seven days.

Cryptography

Anatomy of a brute force attack - what about password complexity?

How much security would you expect in a $60 light globe?

General interest

SSCC 114 - Bitcoins, OpenX and Email privacy [PODCAST]

Android randomness, Sniffer bins & more: 60 Sec Security [VIDEO]

HTTP error code 451: "Unavailable For Legal Reasons"

Hacking and scams

eBay troll and fraudster 'Ebayisajoke' staked out and unmasked

Baby-monitor hacker spies on and swears at sleeping 2-year-old

CNN, Time and Washington Post redirect users to SEA site

Miss Teen USA 2013 says sextortionist hacked webcam

Law and order

Two Canadian men charged in connection with suicide victim

Aussie ATM criminals embrace 3D printers for cashpoint crimes

OS and software

Heads up for Patch Tuesday: 8 bulletins, 3 critical, reboot needed

Patch Tuesday for August 2013 - 3 critical, 5 important

Microsoft pulls critical Patch Tuesday fix for Exchange 2013

LastPass gets patch against password leakage bug

Privacy and online safety

London says media company's spying rubbish bins stink

Fired flight attendant forced to give employer access to Facebook

Google says people can't expect privacy when sending to Gmail

Data breaches - over half are due to carelessness, says ICO

Wait, what? Twitter is a terrorist?

Would you like to keep up with all the stories we write? Why not sign up for our daily newsletter to make sure you don't miss anything? You can easily unsubscribe if you decide you no longer want it.

Days of the week image from Shutterstock.

, , , , , , , , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Paul Ducklin is a passionate security proselytiser. (That's like an evangelist, but more so!) He lives and breathes computer security, and would be happy for you to do so, too. Paul won the inaugural AusCERT Director's Award for Individual Excellence in Computer Security in 2009. Follow him on Twitter: @duckblog