The team of grid operators had spent days restoring power when a digital strike took out one of two operational utility stations. The other utility was also under attack.
CS Digest Section: Most Popular
For the last two years, U.S. Cyber Command ran pilot programs that focused on supporting operations in Iraq and Syria. Now, the U.S. Army is taking lessons from those experiments and applying them to tactical operations.
The National Institute of Standards and Technology (NIST) is planning to use Artificial Intelligence to assign the CVSS scores to reported vulnerabilities.
U.S. Cyber Command has made it clear that it must undertake traditional and nontraditional partnerships in order to succeed in a highly dynamic environment.
Researchers from Radboud University Nijmegen in the Netherlands yesterday disclosed a pair of vulnerabilities in the hardware full-disk encryption mechanisms of self-encrypting solid state drives (SSDs) from Samsung and Crucial. The flaws are present in both internal and external storage devices from these manufacturers, and even affect Microsoft Windows
Researchers have uncovered an active phishing campaign which targets Android devices in order to turn them into mobile proxies.
A new Navy policy recognizes the electromagnetic spectrum as a warfighting domain "on par with sea, land, air, space and cyber."
A "red teamer" cracked into a US Department of Defense system and rebooted it, but nobody noticed: the system suffered unexplained crashes. In another case, testers "caused a pop-up message to appear on users' terminals instructing them to insert two quarters to continue operating."
The leaders of two contenders for the Pentagon's massive cloud contract sounded off on Google's decision not to bid.
Most of us have been trained to be wary of clicking on links and attachments that arrive in emails unexpected, but it's easy to forget scam artists are constantly dreaming up innovations that put a new shine on old-fashioned telephone-based phishing scams. Think you're too smart to fall for one? Think again: Even technology experts are getting taken in by