The National reports that Dubai police social media accounts were hijacked by hacktivists over the weekend.
Reporters at the Sochi games say Russian authorities are clamping down on their use of private Wi-Fi. (Observers in the diplomatic press argue that cyber threats to the Olympics—so far more adumbrated than arrived—should motivate Russia and the US to closer security collaboration.)
The San Francisco Chronicle reports network intrusions hit medical device makers Medtronic, Boston Scientific and St. Jude Medical during 2013. The hackers appear to have been after intellectual property, and the compromises may have endured for several months. (The article cites a source "close to the companies," but no corporate disclosures.)
Barclays Bank suffers a breach that may have sent some 27,000 customers' data to dodgy "spank shops" trading commodities at inflated and thus effectively worthless levels.
New point-of-sale threats are discovered. Analysts debate whether Target's breach was in fact due to a "billing system" connection with Fazio Mechanical. In any case, network segmentation remains sound practice. Chip-and-pin systems may offer in-store protection, but may also (argue some security specialists) bring with them increased online vulnerabilities.
Ransomware's continued spread (with new stories of its unpleasant consequences for a law firm) serves as a reminder of another sound practice: regular backup.
Sophos buys Cyberoam. Telecommunications M&A chatter is up for Deutsche Telecom and Alcatel-Lucent, down for Sprint.
US collegiate cyber competitions see state and regional run-ups to national events. (Rose-Hulman, for example, just took the Indiana prize.)
US surveillance policy's evolution continues.