Officials in the US and UK continue to simultaneously warn of ISIS intentions to attack critical infrastructure while deprecating the soi-disant Caliphate's technical capabilities to do so.
ISIS remains most active in social media, of course, and War on the Rocks has an account of ISIS Twitter usage — the familiar story of a factitious community's appeal to the disaffected. Prosecutions of ISIS adherents in London and Texas highlight both the possibilities and limitations of monitoring social media for clues to terrorist activity: useful in investigation and prosecution, but in prediction the signal-to-noise ratio is frustratingly low.
New accounts of US intelligence collection against foreign targets appear. The operations are said to have had collateral collection of US parties to electronic conversations as their side effect.
Windows 10's recovery feature sends user encryption keys back to Microsoft. Several observers offer suggestions for working around what's generally unwelcome functionality.
Non-jailbroken iOS devices can bypass the protections of the app store and load apps — many of them potentially dangerous — from rogue marketplaces using what Proofpoint calls "DarkSideLoaders."
Microsoft has issued an emergency advisory for Edge and Internet Explorer that addresses vulnerabilities recently discovered in Adobe Flash Player.
In industry news, FBR Capital forecasts very high demand for cyber security products and services in 2016; it also foresees a wave of mergers and acquisitions in the sector.
US cyber legislation remains controversial as its implications are digested. India deliberates information sharing and Internet sovereignty. Businesses worldwide consider the effects of China's new security laws.