Syria is back online, with Internet connectivity restored over the weekend.
Little new has emerged on the malware recently discovered stealing technical data from Japan's space agency, but researchers discern Chinese government fingerprints in the exploit, and believe the discovery points to a large technical espionage campaign.
A new stack buffer overflow vulnerability is found in MySQL. An Instagram vulnerability permits iPhone account takeover. Screenshot tools are found to have data leakage vulnerabilities.
The UK government undertakes a drive to warn the public of the online threat, and begins by disclosing that foreign governments are trying to map critical infrastructure as a precursor to cyber attack. (An expert, however, claims plausibly that a major Internet disruption is likelier to come from a "glorious cock-up" than a state-sponsored attack.)
The US Government approaches "fiscal cliff" and sequestration deadlines; observers see an eleventh hour budget accord as unlikely. Raytheon, however, says it believes the cliff will prove a mere "speed bump," and that in any case foreign sales will keep the company flush. Trend Micro positions itself for an emerging market in cyber offensive capabilities.
DARPA's Vetting Commodity IT Software and Firmware (VET) program, which will "look for innovative, large-scale approaches to verifying the security and functionality of commodity IT devices" kicks off with a Proposer's Day next week.
UN Internet governance talks are underway in Dubai. The US Army concludes an investigation into the Palantir-DCGS fracas and finds no wrongdoing, but system partisans (especially those Wired calls "Palantir fanboys") remain unconvinced.