FUD raineth on the just and the unjust, as evidence of ISIS's tweeted morbid suspicions that it's been infiltrated by "crusaders" attests.
The Sony hack remains an object of intense interest. The loss and damage are considerable and still being assessed: some 40 gigabytes of sensitive information, Wired reports, has leaked to the Internet. Ars Technica publishes a brief overview of the attack's destructive "wiper" functionality. Attribution has, as is usual in such cases, moved into a slightly controversial phase. Sony denies re/code's report that the company was about to "officially" blame North Korea for the attack: Sony insists the incident remains under investigation. Other security experts cast doubt on the North Korean attribution, but consensus opinion still looks at Pyongyang.
The high-profile attack on Sony has also stoked investor interest in cyber security firms.
Asprox's criminal masters are aggressively recruiting machines into their botnet. They're using phishing emails asking the recipient to "confirm their order;" such appeals are particularly effective during holiday gift-giving.
Concerns about Android vulnerabilities resurface. Some of them involving pre-installed malware revive concerns about Chinese threats to the global IT supply chain.
Wired interviews "Darkside," billed as the world's biggest surviving online drug lord.
The US Department of Homeland Security expands cyber security student internship opportunities.
Foreign policy mavens assess China's cyber policy, and see preservation of the Communist Party as its principal objective.
The prospective US Defense Secretary, Ashton Carter, is expected to devote close attention to cyber security. He'll get help from Senator McCain.