Anonymous claims to have breached the US Census Bureau, releasing US Government officials' personal information. (Not all affected officials are from the Census Bureau.) Opposition to the Trans-Pacific Partnership Agreement (TPP) and Transatlantic Trade and Investment Partnership (TTIP) motivated the hack, Anonymous tells HackRead. The collective's self-described representative also says getting in (by SQL injection) was "a piece of cake," and that this will "hurt a lot of people."
HP's TippingPoint announces four execution-code vulnerabilities it found affecting smartphones using Microsoft's Internet Explorer. TippingPoint disclosed these privately to Microsoft some months ago; their self-imposed embargo on public discussion expired over the past weekend. The bugs remain unpatched. Microsoft says it's monitoring the situation, and has observed no attacks in the wild.
More malicious apps are found in the Google Play Store.
As the US OPM restores access to its e-QUIP system (noting security enhancements and testing) bills to extend breach victims' support advance in Congress. Observers say (Fox News breathlessly reports) that the incident is much bigger than generally appreciated, and that its effects aren't fully contained. More calls for deterrence appear, some of which recognize the complex relationship between combat and intelligence collection. The inevitable scams persist: the Federal Trade Commission wants you to know they're not calling you about OPM; OPM warns against continued phishing.
In industry news, public and private cyber companies attract investors. Raytheon, unlike other big defense integrators, seems committed to the commercial cyber market.
Patching, vital to security, must, SANS warns, be done deliberately.