Members of the notorious LulzSec hacking gang have been sent to jail:
http://nakedsecurity.sophos.com/2013/05/16/jail-lulzsec-hacking-gang/
Who was Avunit? LulzSec chatroom logs obtained and published by the Guardian in June 2011 show that there was a sixth member:
http://www.guardian.co.uk/technology/2013/may/16/lulzsec-unanswered-questions
A man who used his IT expertise to launch cyber-attacks on the websites of Oxford and Cambridge universities has been jailed for two year:
http://www.guardian.co.uk/technology/2013/may/16/jailed-attacks-oxford-cambridge-websites
It has emerged that more than 25,000 cyber-attacks were carried out against Essex County Council in the past year:
http://www.bbc.co.uk/news/uk-england-essex-22564652
Secretary of Homeland Security Janet Napolitano said that a system being developed to scan Internet traffic headed toward critical businesses would block attacks on software programs that the general population does not realize are possible:
http://www.reuters.com/article/2013/05/15/us-cyber-summit-flaws-idUSBRE94E11B20130515
Google is integrating Gmail with Google Wallet so that users can send payments as a mail attachment, even if the recipient doesn’t have a Gmail address:
https://www.networkworld.com/news/2013/051613-google-wallet-makes-payments-possible-269828.html
Over 150,000 computers, most of them belonging to Australian users, have been infected with this malware since 2012 and were added to a botnet that Group-IB researchers have dubbed “Kangaroo” or “Kangoo,” after a kangaroo logo used on the command-and-control server’s interface:
Are Cyber-Weapons Effective? – Assessing Stuxnet’s Impact on the Iranian Enrichment Programme:
http://www.tandfonline.com/doi/full/10.1080/03071847.2013.787735
What might the “post-APT” threat landscape look like? Some ideas for anticipating the future:
http://blog.zeltser.com/post/50497161014/anticipating-cyber-threats-beyond-apt
For more than two years, the Linux operating system has contained a high-severity vulnerability that gives untrusted users with restricted accounts nearly unfettered “root” access over machines: