Tensions on the Korean peninsula rise as the North apparently subjects the South to widespread cyber attacks against banks and broadcasters.
A hitherto unknown hacker-cum-researcher uses what he describes as a "harmless botnet" to conduct an Internet census. His methods are of dubious legality, to put it mildly, but his results are interesting: he infected ("harmlessly" [sic]) about 420,000 poorly protected network devices around the world.
T-Mobile's default Wi-Fi Calling is found vulnerable to man-in-the-middle attack. The Chameleon botnet is proving a successful click-fraud tool. Gamma Group's Finfisher lawful intercept tool continues to turn up in surprising places.
A German academic researcher demonstrates that Google and Waze could be exploited in ways that could create (physical) traffic jams in regions that rely on them for navigation. Trend Micro's SCADA honeypots find that attacks on industrial control systems use surprisingly extensive and thorough reconnaissance to prep their exploits.
Spamhaus says it wasn't attacked by Anonymous, but by Russian criminals, which leads one to wonder if this may not be a distinction without a difference. Compare the European police study of how cyberspace affects the evolution of criminal gangs.
China's National Computer Network Emergency Response Technical Team Coordination Center reports a twenty-one percent rise in attacks on government sites in 2012—the Americans, the Chinese government says, are behind most of them.
Amazon will provide the CIA cloud services. KEYW expects its revenues to double, and Barracuda Networks pushes into the K-12 education market. The Common Vulnerability Scoring System gets a makeover.