The Korean Dark Seoul attacks remain baffling. Early clues pointing to China are now discounted, some attacks appear to have originated from within Seoul itself, and, while attribution is still elusive, analysts think it "increasingly likely" that the campaign is government-led. (Which government is unknown, but suspicion as always on the Korean Peninsula turns Northward.) General Dynamics offers some good news: it says much data wiped in the attack can be restored. South Korea worries about the North's apparent training of cyber operations teams, and considers establishing a cabinet-level cyberspace post.
Various Anonymous cells bedevil governments around the world. Charaf Anons defaces Chinese official sites. RedHack, Anonymous and Sector 404 claim to have hacked Israel's Mossad and compromised officers' identities. The compromise claim seems bogus, but OpIsrael prepares an attack surge for April 7. Israel shores up its defenses.
Indian media criticize their government's reliance on GMail and Yahoo accounts, which they claim are inherently vulnerable to compromise.
T-Mobile addresses a Wi-Fi vulnerability. Apple and Cisco struggle a bit with recent security upgrades.
Lockheed-Martin and Raytheon are both aggressively competing with telecommunications companies for financial and power grid cyber security market share. Cyber lobbying rises dramatically in Washington: lobbyist filings in 2012 were up 85% from 2011.
Shanghai Jiaotong's School of Information Security Engineering appears to be providing China's PLA with cyber attack R&D. NATO suggests Stuxnet was an arguably illegal "act of force" against Iran. A US Naval War College study argues for deadly force in retaliation against hackers.