Over the weekend Der Spiegel reported widespread US surveillance—"bugging"—of EU offices and interception of other US European allies' electronic traffic. The German Foreign Minister has summoned the US ambassador to demand an explanation, and European officials say the allegations will have far-reaching effects on trans-Atlantic relations (starting with pending trade agreements). Chinese reaction is, predictably, one of satisfied high dudgeon. Current and former US officials offer a range of tu quoque defenses (seconded, in the case of Chinese cyber espionage, by the UK) but there's little doubt that the diplomatic implications of PRISM and related allegations are serious and enduring.
Last week's attacks on Korean sites are still being sorted out. About 100,000 people's personal data were exposed in the breach of the Republic of Korea's presidential site. A profile of the Dark Seoul gang emerges. Universities in Brazil and the United States also suffer data breaches.
Several new exploits are demonstrated, including an HTTPS side-channel attack and a "keyjacking" hack. The Blackhole exploit kit sniffs around Pinterest, and Opera continues to suffer from its vulnerabilities. US-CERT discloses a cyber campaign unnamed actors conducted against US natural gas pipelines earlier this year.
US policymakers continue to grapple with fallout from the PRISM affair. The Senate wants to grill DNI Clapper (again) in the wake of press reports about surveillance programs. Former DCI Hayden calls for more openness about intelligence operations. Congress-watchers think PRISM has indefinitely delayed legislative action on cyber security. India rolls out its own surveillance program.