The US FBI has warned businesses to beware of new cyber espionage campaigns emanating from China (some of them are exploiting the recently patched Flash vulnerabilities).
Coincidentally or not, China turns the screws on Western — particularly US — IT firms, asking them to supply source code, submit to intrusive security inspections, and install backdoors if they hope to sell to Chinese banks. (Apple may be particularly affected.)
Kaspersky and others continue to focus on Britain's GCHQ as the author of Regin spyware. (Snowden documents deliver a separate poke to another of the Five Eyes with allegations of global Internet surveillance by Canada's CSE.)
The ZeroAccess botnet is back and freshly equipped with click-fraud functionality. Cutwail's botmasters also show some new tricks, distributing the Dyre banking Trojan in short-burst spam "blitzes."
Linux vendors patch GHOST, but worries of Internet "collateral damage" persist.
LIFARS claims it's found privacy vulnerabilities in both Chrome and Firefox.
FreeBSD patches code execution and memory flaws in its kernel code.
Security experts study real and ramified costs of attacks: data breaches ("a personal nightmare" for security officers) and denial-of-service attacks (damage quantified) are analyzed.
The Gnomes of Zurich are staking out a corner of cyberspace: as international banking becomes less private, Swiss bankers turn their expertise to data security.
The Internet-of-Things draws regulators' attention in the US and UK.
Why does Iran hack? To enhance its regional power.
No, the FBI is not opening a dating service for skids, but one Special Agent thinks, hey, that's a thought.