US information operations against ISIS continue to draw lukewarm reviews. ISIS sympathizers themselves tweeted threats of cyber attack against US targets, but since H-hour was 2:00 PM EDT yesterday, either the attack time slipped, the attempt fizzled, or the whole threat was so much rodomontade. (Our money's on the last explanation.)
Iran's homegrown search engines appear to be part of the Islamic Republic's information-filtering apparatus.
The US Defense Department's regular report on China's military and security posture warns that what journalists call "network-killing cyber attack tools" are under development. Some hard evidence accompanies a great deal of prudent argument from a priori possibility. (The recently concluded Sino-Russian cyber-nonaggression pact hasn't drawn much comparison with the Molotov-Ribbentrop pact, but it may have analogous import: division of cyberspace into spheres of influence, agreement not to interfere with each others' offensive operations, etc. Not lasting non-aggression, but not particularly good news for the US and its allies.)
MacKeeper, famous for "noisy pop-ups" (as Threatpost calls them), is patched to close a remote-code execution vulnerability.
Researchers track the Angler exploit kit's evolution in malvertising, obfuscation, and ransomware distribution.
A criminal group is deploying the Fiesta exploit kit against Windows systems.
People notice that GitHub dorking may be as problematic as the better-known Google dorking.
The Tor Project shuts down Tor Cloud for lack of resources.
The Gulf Cooperation Council wants a cyber pact with the US (like the one Japan has).
NSA Director Rogers warns hackers to expect to face some kind of music.