The next step in ransomware's evolution seems to be a jump over to Android: the criminal Reveton team is preparing a suitable variant of "Police Locker." It's a low-grade evolution, detectable by most standard AV tools and requiring user intervention to install, but Police Locker's creep into Android is a healthy reminder that malware and its masters don't stand still.
The last word on Covert Redirect is out: it won't be patched because it's not a bug. The last advice? Exercise care in granting applications access to your systems.
Now that the CVE-2014-0515 zero day is patched, TrendLabs offers its analysis of how the recently disclosed Adobe Flash vulnerability was exploited in the wild.
Threatpost reports a new iPhone passcode bypass.
Dog-bites-man, but cave cyber-canem: Sophos's itinerant war-biker visits Las Vegas and finds—surprise—that unsecured public Wi-Fi is risky. (And who would have thought Las Vegas risky?)
ComputerWorld runs a warning against "offensive forensics," a kind of cyber reconnaissance-in-force attackers use to prepare subsequent assaults on networks and systems.
The Target CEO's resignation, seen as a move to restore customer (and partner, and investor) trust in the wake of last year's data breach, is also seen as a warning to other CEOs: cyber security problems can be expected to exact a high toll. Some large companies (like IBM) frame security offerings with this in mind.
Remember ham radio? Someone claiming to speak for Anonymous thinks it's a potential source of secure bandwidth.
Interesting reports on Friday's Deshowitz-Hayden-Greenwald-Ohanian surveillance debate.