Cyber rioting, some state-directed, some evidently done for the lulz, continues in the Middle East, with some spillover into the US.
State-sponsored cyber espionage continues to draw media attention. China's "cyber production line" seems evidence of collaboration among criminal gangs and security services. Gamma Group FinFisher lawful intercept product continues to leak from Germany even as Germany's Spiegel reports fresh allegations of GCHQ/NSA observation of German targets. Australia and New Zealand respond to leaks of Five Eyes surveillance.
JPMorgan cautiously reports there's no evidence that its customers were victims of fraud as the result of recent Wall Street hacks.
Home Depot alumni discuss the retailer's security practices, pre-breach. Trend Micro names point-of-sale ROM-scraping malware the "overnight sensation" of this year's retail breaches.
InformationWeek explains the significance of Dyre malware for cloud security.
Trend Micro finds a 64-bit version of MIRAS malware in a targeted attack against a European IT firm.
Belden reports that Dragonfly/Havex, first associated with attacks on the energy sector, is now sniffing around pharmaceutical companies.
InformationWeek offers a primer on electromagnetic pulse (EMP) and the risk it poses to electronics — said to be overblown. (Still, if EMP's threat spooks you, you can avail yourself of an EMP-hardened data center.)
Observers warn of "hybrid war" — an asymmetric form of conflict that combines both cyber operations with low-level kinetic combat.
Veracode and CyberArk prepare their IPOs.
US surveillance and intelligence policy continue their path in the absence of new doctrine or strategy.
Huawei and HP both face corruption allegations.