While cyber exchanges continue between Russia and Ukraine, they do so at a surprisingly low level, essentially indistinguishable, say observers, from the ordinary background noise of hacktivist defacements. The Snake espionage framework, widely believed a creature of the Russian intelligence organs, clearly figures in a major cyber campaign, but the visible and public attacks seen in earlier operations against Estonia and Georgia—widespread denial-of-service attacks, for example—have yet to appear, nor has an expected Ukrainian counterpunch. (But Snake, at least, suggests more may be happening beneath the surface.)
Yesterday's hacktivist campaign against Israel opened with a predictable fizzle. The fizzlers promise big, big things, however, in April.
McAfee Labs' report on the rising importance of the Dark Web to the criminal economy draws comment, not only on the Dark Web itself, but also on criminals' increasing use of Tor as a cloak for their activities. (For a Tor primer, see older but still valuable MIT Technology Review pieces on the technology behind it.)
Cyber criminals are also making a last minute surge against the Internet Explorer zero-day (CVE-2014-0322) before Microsoft patches it later today. (Laggards who fail to patch will suffer.)
Observers think criminals are hoarding Windows XP exploits for use when Microsoft support for the OS stops.
A virtual currency, "Ponzicoin," appears to be a scam. (And who could've seen that one coming?)
Analysts see machine learning as a coming defensive trend.
Retailers mull forming a commercial ISAC for information sharing. One hopes they're also mulling anonymization.
BRTRC acquires SecureForce.