Norway's Foreign Ministry is working to expunge malware that's established persistence in its networks. The Ministry is being tightlipped; media speculation centers on Russian and Chinese intelligence services (empirically grounded probabilistic speculation).
Reports surface of extensive Iranian catphishing on LinkedIn. The bogus profiles are said to be convincing, so add people to your professional network with due discretion.
Snowden returns to the news with allegations of a GCHQ campaign against Russian targets.
The hackers who got into Samsung subsidiary LoopPay may have been interested in data on individuals as opposed to any immediate monetization of their hack, which suggests to some observers that intelligence services may be responsible.
enSilo researchers describe the Moker RAT, a persistent threat that doubles as a LAT.
Krebs sees the roots of the Experian breach in "security attrition" during acquisitions.
To the threat of compromise through lost devices add the threat of exploitation via second-hand devices, as much data stays on them, forgotten but still accessible.
Newly free of litigation with Volkswagen, a University of Birmingham researcher publishes information on automobile hacking vulnerabilities — 100 car models are said to be affected.
The IEET looks at the Internet-of-things and sees a bad moon rising over the Lebenswelt: securing the IoT looks like "applied demonology."
Observers see a lack of standards as problematic for IoT design, and in other areas as well. NIST issues several draft standards for comment.
Sino-American cyber relations remain strained amid new calls for sanctions.
Industry sorts through the demise of Safe Harbor.