Syria disconnects from the Internet again, with some evidence that Assad's regime may be responsible for the isolation. Algerian members of "Hannibal Team" attack Qatar's Ministry of Islamic Affairs to show solidarity with the pro-Assad Syrian Electronic Army.
A British study suggests that Stuxnet, by exposing vulnerabilities at Iran's Natanz uranium enrichment facility, may have helped more than hindered that country's nuclear program.
Taiwanese cyber rioters release DNS information on Pastebin that could affect Philippine government websites. Trend Micro finds Islamist traces among poisoned urls used in Anonymous' fizzled OpUSA.
Webroot finds malware in a Chinese calculator Android app. Cisco discloses (and swiftly patches) a denial-of-service vulnerability in its TelePresence Supervisor. Venerable spam botnet malware PushDo reappears with a new domain generation algorithm. Exploits for Linux kernel vulnerabilities spread in the wild.
Bogus FedEx and Deutsche Bahn messages circulate malware. Hacker "Ag3nt47" claims to have exploited an SQL vulnerability on Harvard, Stanford, and MIT networks.
Last week's ATM thefts reveal that pay card transactions have moved beyond the control of merchants, and this realization (along with the attendant vulnerabilities the caper exposed) embarrasses India's IT services sector.
Privacy concerns about lawful (or perhaps less-than-lawful) intercept operations rise on revelations of US Justice Department access to journalistic and Congressional communications. Advocates wonder if Skype traffic is routinely provided to law enforcement, and Eustace Tilley's New Yorker, not generally thought of as an investigative powerhouse, offers informants a Tor-accessible dead-drop box.
The Australian budget apparently contains less cyber money than rumor predicted.