Monday review: the hot 21 stories of last week 13 Aug 2012 2 Apple, Data loss, Law & order, Malware, Mobile, Privacy, Social networks, Spam, Vulnerability Post navigation Previous: Pentagon bankrolls new wormNext: WikiLeaks.org is crippled under a massive DDoS. Is the TrapWire leak to blame? by Anna Brading Just in case you weren’t glued to Naked Security all last week, we’ve put together a helpful recap for you. Apple Beware! Free Apple products used as lure in text scams Mac malware – the threat is real Journo totally owned thanks to over-helpful iCloud support Social networks Are you a potentially dangerous social misfit (aka not on Facebook)? How to report phishing to Facebook Creepy Quora erodes users’ privacy, reveals what you have read Mobile Japan to test phones with scam detection systems Vulnerability Insecure WordPress blogs unwittingly host Blackhole malware attack Blizzard owns up to data haemorrhage – painful but probably not too bad Exploits posing as messages from payroll company ADP Naughty nurse Sakura Shiratori used as a lure to infect defence firm with malware Reuters’s Twitter, WordPress accounts hacked by apparent pro-Syrian government attackers US Pentagon tells Missile Defense Agency workers to quit surfing porn Privacy Australian Privacy Commissioner lays the hard word on Google as WiFi data capture saga continues Vote in our poll: is Google’s fine of $22.5 million enough to buy privacy? How social engineering tricked Wal-Mart into handing over sensitive information Law and order Online Piracy: Challenging the ‘three strikes’ approach Suspected Mariposa botnet mastermind goes on trial Technology Pentagon bankrolls new worm Mars Rover Curiosity touchdown – and you think you’ve got latency issues! Book review The Universal Machine – a fascinating history of computers and computer scientists Featured calendar image, courtesy of Shutterstock Follow @NakedSecurity on Twitter for the latest computer security news. Follow @NakedSecurity on Instagram for exclusive pics, gifs, vids and LOLs! Free tools Sophos Home Protect personal PCs and Macs Hitman Pro Find and remove malware Intercept X for Mobile Protect Android devices Post navigation Previous: Pentagon bankrolls new wormNext: WikiLeaks.org is crippled under a massive DDoS. Is the TrapWire leak to blame?