India joins Norway in accusing China of cyber attacks.
The malware-laden pdf purporting to be Mandiant's report on Chinese attacks against Western news media may have come from a different organization than the PLA unit alleged responsible for the original exploit. The attack itself was directed against Japanese media. Seculert says it was able to warn intended victims in time to thwart attacks whose timing was linked to regular communication with command-and-control servers. (In other Chinese timing notes, dissidents interested in slipping items past government censors have their best luck posting at 7:00 p.m. Beijing time, when censors take a break to watch the evening news.)
Iran's Izz ad-Din al-Qassam Cyber Fighters promised more denial-of-service attacks, and today their threat's made good. Many of the banks hit are repeat victims: PNC, Wells Fargo, Citibank, and Bank of America, among others.
Saudi Aramco, still skittish from last year's Shamoon campaign, has its Twitter account hacked. (Analysts recommend two-factor authentication for Twitter.)
Android continues to attract malware developers, and its ecosystem's fragmentation allows old vulnerabilities to persist.
Exploitation via browser proxies is expected to be the next big thing in cyber crime. Bit9's breach disclosure may be an exemplar for security firms. Businesses and the FBI worry about state-sponsored hacking. New aircraft are so connected, their flight systems so data-intensive, that they offer very large attack surfaces. (Boeing 787s create half a terabyte of data during every flight.)
DARPA's Cyber Fast Track closes, but may serve as a model for successor programs.