Anonymous hacktivists, exercised by Russian troop movements in the vicinity of Ukraine, announce Operation Ukraine (#OpIndependence) and threatens a cyber riot against any country (and they're looking at you, Russia) that would undermine Ukrainian stability and independence.
CryptoLocker continues its creepy spread through the United Kingdom, with vectors now masquerading as Royal Mail communications. The ransomware is enjoying surprising success: a University of Kent study suggests forty percent of British CryptoLocker victims are paying up.
Bogus "payment certificate" notifications carry a cross-platform Java remote access Trojan (JRAT) to targets in the UK and the UAE.
"Gameover," current darling of the ZeuS Trojan family, gets an unwelcome upgrade in the form of a kernel-mode rootkit.
SpyEye and Tilion banking malware are found to be the work of the same author (or team of authors).
The energy sector continues to mull its difficulties obtaining cyber insurance. Vulnerabilities in that sector seem, a study published by Rice University suggests, particularly well-placed to spread risk to defense establishment targets. Energy companies are advised to take a hard look at cyber risk and give the recently released NIST cyber framework close attention.
Where, an editorialist wonders on the hundredth anniversary of sea power theorist Alfred Mahan's death, is Mahan's cyber power counterpart?
Bitcoin exchange Mt. Gox has filed for bankruptcy amid reports it's lost coins worth $473 million, but competing exchanges (and their clients) aren't giving up on the cryptocurrency.
Security researchers outline ten crypto transparency principles in an open letter to the tech industry.