Officials and researchers continue to warn those attending the Sochi Olympics (or even watching from home) of the games' attendant cyber risks.
The Syrian Electronic Army made an attempt on Facebook's domain, but two-factor authentication and registry lock apparently kept the would-be DNS hijackers out.
This week's hasty Adobe Flash patch addressed a vulnerability currently being exploited in the wild. Kaspersky offers technical details—Flash users should patch.
For some weeks now the Target hackers were said to have compromised point-of-sale systems via stolen vendor credentials. Krebs reports the vendor's been identified: an HVAC and refrigeration subcontractor. Target (which says only 25 cash registers were infected, but that was enough) is accelerating its plans to adopt chip-and-pin pay card technology. The US Secret Service tells Congress the Target hackers were "highly technical and sophisticated" and probably located outside the United States. The malware used was crafted for Target, and different from that deployed against Neiman Marcus.
The creepy cyber vandals of NullCrew boast that they were the ones behind the recent Bell Canada hack. They also claim blame for an attack on Comcast servers.
Some of the luster temporarily glittering about Huawei for its new UK security center is tarnished by developments elsewhere in the Commonwealth: Indian authorities are investigating the Chinese company for allegedly hacking telco Bharat Sanchar Nigam (BSNL).
"Waking Shark II," the financial cyber exercise led by the Bank of England, has reported. It finds poor technical information sharing mechanisms the biggest obstacle to common cyber defense.