Show notes: Risky Business #270

Oh noes! Not Burger King!?!
February 22, 2013 -- 

Here are this week's show notes for episode 270 of the Risky Business podcast! Links to articles, events, sponsor whitepapers, music and more!

Burger King Twitter account hacked, defaced | Security & Privacy - CNET News

Chinese Military Group Linked to Hacks of More Than 100 Companies | Threat Level |

China slams cyberattack accusations over lack of proof | Security & Privacy - CNET News

Spear Phishing Campaigns Use Fake Mandiant APT1 Report as Lure | threatpost

Chinese hacking: Obama admin. signals it will elevate issue with Beijing

Apple: Employee computers were targeted in hack attack | Security & Privacy - CNET News

New Mac malware opens secure reverse shell | Security & Privacy - CNET News

Facebook Says Employee Laptops Compromised in 'Sophisticated' Attack | threatpost

Bit9 Breach Began in July 2012 — Krebs on Security

Apple updates Java in Mac OS X - Applications - SC Magazine Australia - Secure Business Intelligence,apple-updates-java-in-mac-os-x....

Apple, Facebook, Twitter hacks said to hail from Eastern Europe | Security & Privacy - CNET News

Forum site gives more details on Apple and Facebook hacks | Security & Privacy - CNET News

Twitter aiming to slash phishing e-mails sent from '' | Security & Privacy - CNET News

Yahoo! updates four-year-old Java download - Applications - SC Magazine Australia - Secure Business Intelligence,yahoo-updates-four-year-old-jav...

Facebook wins German case on pseudonym ban | Security & Privacy - CNET News

Google account takeovers down 99 percent - Applications - SC Magazine Australia - Secure Business Intelligence,google-account-takeovers-down-9...

Biometric USB password key worthy of 'Mission: Impossible' | Security & Privacy - CNET News

Could Smart-Watches Replace Passwords as Authenticators? | threatpost

Adobe patches critical security flaws in Reader, Acrobat | Security & Privacy - CNET News

NBC Website Hacked, Leading Visitors to Citadel Banking Malware | threatpost

White House Must Respond Publicly to Ban on Mobile-Phone Unlocking | Threat Level |

Avoid The Attack Attribution Distraction | threatpost

PayPal Credentials For Sale, Access Offered Via Proxy Server | threatpost

How does Mossad choose spies? |

Senetas - Security Products White Papers



droplar's picture

The Twitter account they have is really good. That is something they have been working out for the future. - James D. Sterling