The Syrian Electronic Army resurfaces. Disgruntled that Assad-fils isn't receiving the positive buzz they feel he deserves, the SEA briefly defaces a Washington Post page to inform everyone that "The media is [sic] always lying."
Much Chinese cyber activity is noted as the week ends, much of it targeting governments around the South China Sea (and the Himalayas, although the South China Sea holds the greater geopolitical interest). FireEye reports finding command-and-control IP addresses embedded in Microsoft TechNet portal pages. Trend Micro says operation "Tropic Trooper" has been using venerable bugs, social engineering approaches, and steganographic techniques to infiltrate Taiwanese and Philippine government and industrial targets. Kaspersky offers a rundown of the Naikon APT and its targets.
Brazil continues to afford rich pickings for cyber criminals. IBM describes the Pezão Trojan, now infesting Brazilian networks.
mSpy, whose software-as-a-service offering promises to keep tabs on children, husbands, and wives in the mobile Internet, has apparently been hacked, as Krebs reports finding sensitive data on some 400,000 people dumped into the dark web.
Researchers ladle out some sauce-for-the-gander as they disclose unpatched bugs in Google App Engine.
Verizon fixes a password-reset issue. Cisco patches bugs in telepresence products.
Variety describes how Hollywood is running a tighter cybership in the wake of the Sony hack.
Reuters says CSC may break itself up.
Rumors of a FireEye sale are quashed (the company thinks it won't consider offers before it reaches $1 billion in annual sales).
Germany engages in national introspection over reported BND-NSA ties.