Learn about by the Cyber Information Sharing Act (CISA) of 2015.
CS Digest Section: Most Popular
Samy Kamkar, the inventor of numerous hacking tools, has created another mind-blowing device, one that can accurately read and predict credit card numbers, and bypass chip & PIN safeguards embedded within modern cards.
Analytics code deeply hidden in popular Google Chrome extensions is being used to track users across the Web, in different browser tabs, and without user consent.
The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program.
The Defense Advanced Research Projects Agency will bring together potential proposers on Dec. 14 to give industry more information on its cyber threat monitoring needs in advance of forthcoming solicitations under a broad agency announcement known as the Rapid Attack Detection, Isolation and Characterization, or RADICS, program.
50 MILLION accounts compromised in a similar manner to "the many high profile attacks on other Internet-based companies that have taken place over the last several weeks"
Insider Threat: You can still exfiltrate a lot of classified data on a CD.