Turkish hacktivists ("TurkGuvenligi") hit the Syrian Electronic Army's website with denunciations of SEA "imbecils" (sic) who phish Turkish citizens. TurkGuvenligi promises both retaliation and (eventual) divine retribution.
The cyber threat to the Sochi Olympics continues to take shape as Islamist hacktivists of "Caucasus Anonymous" promise to disrupt the games.
InterCrawler reports an increase in black-market shopping for decryption services. It links this to recent US retailer breaches: it's a sign the cybercriminals responsible are working to fence stolen data in a usable form. Target works to contain reputational damage, but an early initiative—$5M for online security awareness training—is cooly received. Payment card sector analysts see two industry-wide responses as likely (and prudent): more widespread adoption of chip-and-pin cards in the US, and better information-sharing among retailers and financial institutions.
Lest one think data vulnerabilities are restricted to the world of commerce, think again: not-for-profits are also targets. The US Fund for UNICEF has disclosed a November 2013 breach that exposed individuals' names, phone numbers, and credit card information in at least three US states.
Researchers report finding 60,000 SCADA systems exposed to hacking worldwide.
Kaspersky says the "Icefog" cyber espionage campaign, generally thought of as affecting Japanese and South Korean targets, exploited Java vulnerabilities to infiltrate three US oil and gas companies' networks.
Sino-American cyber tensions simmer unabated, with US firms struggling to stave off IP theft, Chinese companies concerned about allegedly compromised systems.
Four areas draw intense cyber industry interest: malware analysis, forensics, zero-day sales, and privacy solutions.