Cyber-rioting flares up across South Asia and Oceania. An incipient clash between patriotic hacktivists of Australia and Indonesia bears watching: Anonymous Indonesia gets in the first punch with an alleged hack of the Australian Secret Intelligence Service's public website. The Syrian Electronic Army hits a site that posted a list of alleged SEA members.
Der Spiegel reports that Britain's GCHQ used LinkedIn and other social media to engineer intrusion into Belgacom. The operation allegedly extended to other Global Roaming Exchange (GRX) providers.
The European Union mulls what recent compromise of Finland's diplomatic traffic might mean for the EU (either Russia or China are suspected).
A new Internet Explorer zero-day, this one a memory-resident exploit distributed by watering hole, is found in the wild. (The "Deputy Dog Gang" is implicated.) Microsoft is expected to patch this vulnerability sometime today.
Google Drive is being used for malicious redirects. Smartphone cameras and microphones can be exploited to reveal PINs.
FireEye sees a common hand behind several apparently unrelated APT campaigns (and that hand writes a lot of dialogues and menu options in Chinese).
Eugene Kaspersky makes flesh creep in Melbourne with lurid Stuxnet yarns.
A study finding how much malware goes undisclosed (often because of executive shame) highlights the value of anonymous reporting.
Corporate data collection receives hostile scrutiny. Deutsche Telekom announces the coming launch of secure business email services.
Three cyber exercises get coverage this week: a NATO cyberwar game, Britain's financial sector test, and the North American power grid's cyber exercise.