Concerned observers in the Middle East and North Africa note the Islamic State's (formerly known as ISIS or ISIL) alarming proficiency with information operations, particularly its ability to rapidly spawn social media accounts and its Hollywood-like proficiency at lurid terror-propaganda.
The PLA seems to have probed Israel's defense industry with some success (although IAI says China got no sensitive data). The hack of Canada's National Research Council (NRC), also attributed to Chinese intelligence services, is forcing the NRC to undertake a costly, yearlong overhaul of its network security.
Worries about Tor anonymity persist; perhaps details will be forthcoming at Black Hat or DEFCON. Amazon EC2 is exploited for denial-of-service. Android users are warned against the Fake ID vulnerability, and of the possibility of exploits attacking device speakers. This last is a proof-of-concept: expect a flurry of such demonstrations over the next two weeks as Black Hat and DEFCON convene. An Instagram vulnerability exposes iPhones to hijacking.
Various warnings concering Internet-of-Things (IoT) vulnerabilities appear: IoT devices' limited memory limits security possibilities; the devices also tend to communicate insecurely.
The video game industry is under attack by IP thieves known as "Threat Group-3279."
Trustwave compares black market malware to items one might purchase in ordinary life. (While the Chicagoans may be buying high-end seats at White Sox games, the degree of exploit tool commodification remains sobering.)
Worries about empowering a tribe of twelve-year-old script kiddies induce the Hoboken (New Jersey) School District to cancel its program of giving every middle-schooler a laptop.