The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Wei Chen, while serving as a U.S. defense contractor, allegedly plugged a personal thumb drive into computers connected to classified and unclassified networks, against protocols.
Data on Military Communication System Hacked - Korea Times
Information about the military's joint tactical communications system has been stolen by unidentified hackers.
Denis Andzakovic, a hacker and researcher with New Zealand-based security consultancy Security-Assessment.com, has released the source code for KeeFarce, a tool that can export all information stored in the database of a user's KeePass password manager.
Credit monitoring could become a standard perk for federal employees, right along with dental insurance, if the Office of Personnel Management endorses an idea tossed up by the White House.
A team of three security researchers have broken down the myths around Western Digital's famous My Passport hard drives, lauded to provide on-the-fly encryption for all stored data.
When it comes to privacy, computer users across the world are really willing to invest more money to keep their files away from prying eyes, and for many people, self-encrypting hard disks are the first option.
This malicious browser looks and acts just like Chrome--except for all the pop-up ads, system file hijacking, and activity monitoring.
As the "Internet of Things" enters common parlance, the federal government's attempts to protect the network of devices and sensors - both for consumers and government agencies - are gradually building.
Tags: Internet of Things (IoT)
The White House on Friday issued a broad new plan designed to better respond to cybersecurity incidents such as those that exposed secrets on millions of citizens as well as government operations.
It took several tries, but on Tuesday the U.S. Senate approved a measure to help American companies work more closely with law enforcement to fight off hackers.
Vulnerabilities in Mozilla's Find My Device service enabled hackers to carry out attacks that locked the screens of smartphones running Firefox OS, change PINs, make the devices ring, and even wipe all data with only a few clicks.
As an ever increasing number of mobile carriers around the world switches to from using GSM/UMTS networks to Long-Term Evolution (LTE 4G) ones, both carriers and users are facing a number of dangers.
New NTP Vulnerabilities Put Networks at Risk - Security Week
The Network Time Foundation's NTP Project has released an update for the Network Time Protocol (NTP) to address a series of low and medium severity vulnerabilities reported by experts from Cisco, Red Hat, IDA, Boston University, and Tenable Networks.
OPM Breach Update - CSIAC
This podcast is an update to previously popular CS Digest articles on the OPM data breach. It examines recent findings regarding the OPM data breach as well as explores possible uses of the compromised data. Statements from intelligence officials also give perspective on the status of the OPM breach and where efforts are currently being focused.
Tags: OPM Data Breach
Air University Update - CSIAC
This podcast is an update to previously popular CS Digest articles on Air University's cyber curriculum. Topics cover how this new cyber curriculum assists the Air Force in achieving many of their newly announced immediate and long-term mission goals. Additionally, Lt. General Steven Kwast speaks on a panel that provides additional insight for education and training objectives for future Airmen as leaders.
Tags: Air University
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.