Israeli hacktivists "IsraeliElite" plan to kick off "opIslam" tomorrow, presumably against the obvious targets. Assad's Syrian Electronic Army phished Viber to gain the limited access it achieved.
Stanford University suffers an apparent breach, and Anonymous releases its final tranche of FEMA data. Apple continues its recovery from a recent developer site hack.
More emerges on banking Trojan KINS: it resembles Zeus and targets Windows machines. Its older black-market competitor Citadel remains an active threat: Trend Micro finds Citadel active on 20,000 Japanese PCs.
Forbes runs a lurid report of automobile system hacking. "Smart homes," another sector of the coming Internet-of-things that's already here, are proving soft cyber targets.
Security experts continue to warn that bad actors retain the advantage. Among the issues the good actors face are too-easy forgetfulness that defenses must be layered and complex (for example, firewalls aren't sufficient, but they surely remain necessary) and the need for automated, intelligent complements to human watchstanding and reverse engineering. Finally, cyber security operators face a problem familiar to the C4ISR community—radar types call it "track management"—how can you recognize, follow, and engage a distinct threat?
Banks may be seeing their business models shift in the direction of providing trusted identity management.
Effective BYOD policies and technologies still struggle to be born.
PRISM leaks and their attendant, growing mythology are clearly affecting US international IT business, particularly in cloud services. Amazon parries an IBM challenge to its CIA business. The US House narrowly declines to de-fund NSA phone-record surveillance.