OpIsrael returns as 71 Israeli websites are hacked. OpPetrol, targeting mainly Middle Eastern oil producers, is expected to resurface around June 20.
A hack that gets to webcams via browsers is demonstrated. Android malware evolves better obfuscation. Software companies race to close a newly discovered cross-platform zero-day browser vulnerability.
The US FDA warns of medical device cyber vulnerability and proposes new regulation of the device and hospital IT sectors.
Reports suggest that US Government cyber threat information sharing with companies may have involved a metadata sharing quid pro quo.
As the US Congress continues to discuss NSA electronic surveillance, several Senators express doubts over General Alexander's testimony that the program deflected terrorist attacks. It remains unclear how Congress will ultimately respond to the PRISM affair, but observers (and members of Congress) are questioning the efficacy of legislative intelligence oversight.
Among laws under consideration is one that would restrict contractor access to classified information. (Since policy tends to be debated on Aesopian as opposed to analytical grounds, one might note that Bradley Manning was no contractor.) As details of the leak emerge—thumb drives, much online foreshadowing of leaks—analysts wonder why standard security measures seem to have failed.
PRISM has increased cyber tensions between the US and the EU, and hasn't helped with China, either. Observers also see a baleful impact on what's loosely called "Internet freedom." The case raises other questions, including that of corporate liability for leakers.
"Hacking back," some say, could prompt the return of letters of marque.