• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ All CS Digest Sections / RECENT HEADLINES

CS Digest Section: RECENT HEADLINES

Suspect Can’t be Compelled to Reveal “64-character” Password, Court Rules

Posted: 11/26/2019 | Leave a Comment

The Fifth Amendment to the US Constitution bars people from being forced to turn over personal passwords to police, the Pennsylvania Supreme Court ruled this week.

https://arstechnica.com/tech-policy/2019/11/police-cant-force-child-porn-suspect-to-reveal-his-password-court-rules/

Tags: Cyber Legislation, Data Security, Password Security

Exploit Kits are Slowly Migrating Toward Fileless Attacks

Posted: 11/26/2019 | Leave a Comment

Three out of the nine exploit kits active today are using fileless attacks to infect victims.

https://www.zdnet.com/article/exploit-kits-are-slowly-migrating-toward-fileless-attacks/

Tags: Exploit Kit, Fileless Attacks

Critical Flaws in VNC Threaten Industrial Environments

Posted: 11/26/2019 | Leave a Comment

The open-source Virtual Network Computing (VNC) project, often found in industrial environments, is plagued with 37 different memory-corruption vulnerabilities - many of which are critical in severity and some of which could result in remote code execution (RCE). According to researchers at Kaspersky, they potentially affect 600,000 web-accessible servers in

https://threatpost.com/critical-flaws-vnc-industrial/150568/

Tags: Memory-corruption Vulnerabilities, Remote Code Execution (RCE), VNC

Predicting People’s Driving Personalities

Posted: 11/26/2019 | Leave a Comment

System from MIT CSAIL sizes up drivers as selfish or selfless. Could this help self-driving cars navigate in traffic?

http://news.mit.edu/2019/predicting-driving-personalities-1118

Tags: AI, Autonomous Cars, Driving Personalities

Cyberwarriors Lack Planning Tools. That Could Change

Posted: 11/26/2019 | Leave a Comment

For six years, the Defense Advanced Research Projects Agency worked on a program known as Plan X to help commanders plan and conduct cyber operations. The goal was for leaders to see the cyber environment just as they would the physical world. Now, the Air Force and the Pentagon's Strategic Capabilities Office are continuing the program and have renamed it

https://www.fifthdomain.com/dod/2019/11/25/cyber-warriors-lack-planning-tools-that-could-change/

Tags: Defense Advanced Research Projects Agency (DARPA), DoD, Plan X, Project IKE

More Than 1 Million T-Mobile Customers Exposed by Breach

Posted: 11/26/2019 | Leave a Comment

T-Mobile has confirmed a data breach affecting more than a million of its customers, whose personal data (but no financial or password data) was exposed to a malicious actor. The company alerted the affected customers but did not provide many details in its official account of the hack.

https://techcrunch.com/2019/11/22/more-than-1-million-t-mobile-customers-exposed-by-breach/

Tags: Data Breach, Data Security, Mobile Security, T-Mobile

DOD Joins Fight Against 5G Spectrum Proposal, Citing Risks to GPS

Posted: 11/26/2019 | Leave a Comment

The Department of Defense has weighed in against a proposal before the Federal Communications Commission to open the 1 to 2 Gigahertz frequency range-the L band-for use in 5G cellular networks. The reason: segments of that range of radio spectrum are already used by Global Positioning System signals and other military systems.

https://arstechnica.com/tech-policy/2019/11/dod-joins-fight-against-5g-spectrum-proposal-citing-risks-to-gps/

Tags: 5G, DoD, GPS

At DHS, an Exodus of Tech and Cyber Leaders

Posted: 11/26/2019 | Leave a Comment

The rotating cast of officials in top tech and cyber jobs could hinder the department's ability to develop and execute a consistent digital strategy.

https://www.defenseone.com/technology/2019/11/dhs-leadership-turnover-extends-beyond-secretarys-office/161528/

Tags: Cyber Leader, Department of Homeland Security (DHS), Jeanette Manfra

The RIPE NCC Has Run Out of IPv4 Addresses

Posted: 11/26/2019 | Leave a Comment

Today, at 15:35 (UTC+1) on 25 November 2019, we made our final /22 IPv4 allocation from the last remaining addresses in our available pool. We have now run out of IPv4 addresses.

https://www.ripe.net/publications/news/about-ripe-ncc-and-ripe/the-ripe-ncc-has-run-out-of-ipv4-addresses

Tags: IPv4, Networking

Bad News: ‘Unblockable’ Web Trackers Emerge. Good News: Firefox with uBlock Origin Can Stop It. Chrome, Not So Much

Posted: 11/26/2019 | Leave a Comment

Ad-tech arms race continues: DNS system exploited to silently follow folks around the web.

https://www.theregister.co.uk/2019/11/21/ublock_origin_firefox_unblockable_tracker/

Tags: Domain Name System (DNS), Exploits, Web Trackers

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 221
  • Go to Next Page »

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
USD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2019, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Necessary Always Enabled