The Assad regime's use of the "Internet Kill Switch" has not deterred insurgents and their sympathizers from continuing their cyber campaign against the regime—the Syrian embassy in Beijing, for example, is under attack. Regime sympathizers for their part accuse Anonymous of being an instrument of the US State Department. (Anonymous seems more actively engaged against Israel than Syria.)
The Izz ad-Din al-Qassam Cyber Fighters promise more attacks against US banks—their preferred method has been distributed denial of service. The Japanese space agency investigates a cyber incident at the Tsukuba Space Center: malware appears to have been collecting agency technical data and exfiltrating it to an unknown party.
A security researcher claims he's found a vulnerability in Apple devices that can expose their networks to exploitation. Sophos offers a technical look at the Blackhole exploit kit. The SANS Institute publishes a useful list of common coding errors that "lead to 85 percent of criminal Internet activity."
SAIC will continue to provide counterintelligence services under the Global Harvest program, transitioning from the US Air Force to the DIA. Analysts believe 2013 will be a make-or-break year in the mobile device market for both RIM and Microsoft.
The US Department of Energy announces "Piranha," a new tool for text analysis. Bulgaria and the US announce closer cyber cooperation.
Iranian authorities investigate the death of a blogger in Iranian police custody. South Carolina legislators investigating the state's recent data breach allege that a $25,000 dual-password system might well have prevented the incident.