The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Two bills to strengthen cybersecurity in the systems that underlie the nation's energy, water and food supplies passed the House on Monday evening, along with a measure to improve the federal government's cyber workforce.
Hackers Plundered Israeli Defense Firms That Built ‘Iron Dome’ Missile Defense System - Krebson Security
Three Israeli defense contractors responsible for building the "Iron Dome" missile shield currently protecting Israel from a barrage of rocket attacks were compromised by hackers and robbed of huge quantities of sensitive documents pertaining to the shield technology.
Breach Index: Encryption Used in 4% of Q2 Incidents - SC Magazine
Last quarter, organizations that reported data breaches only used encryption around four percent of the time to further safeguard data, a report found.
In a bill aimed at ending government spying on Americans and bolstering privacy, Sen. Patrick Leahy (D-Vt.), chairman of the Senate Judiciary Committee, introduced legislation that updates theUSA Freedom Act.
Earlier this month two researchers announced plans to reveal a way to de-anonymise users of this "dark web".
National Oceanic and Atmospheric Administration satellite data was stolen from a contractor's personal computer last year, but the agency could not investigate the incident because the employee refused to turn over the PC, according to a new inspector general report.
70% of IoT Devices Vulnerable to Cyberattacks: HP - Security Week
A new study published by HP on Tuesday reveals that 70% of the most popular Internet of Things (IoT) devices contain serious vulnerabilities.
Efficient Over-The-Air Software and Firmware Updates for the Internet of Things - Open Mobile Alliance
There is a growing need for a comprehensive way to remotely manage these devices. Firmware Over The Air (FOTA) is a cost-effective, reliable, and secure method for updating connected devices.
Efforts to reform government surveillance laws continue to push through Congress. The USA Freedom Act of 2014 is the latest step in that direction.
Federal websites that collect personally identifiable information would have to be certified as secure by an agency chief information officer under legislation the House passed Monday evening.
Innominate Security Technologies, a Germany-based company that specializes in communication security components and solutions for industrial networks, has fixed a vulnerability affecting its mGuard series industrial security routers.
Google Patches Android’s Fake ID Exploit - VPN Creative
The mobile security company Bluebox Security reported a serious hole in Android that affects almost all versions of the operating system dating back to 2.1.
Android “FBI Lock” Malware- How to Avoid Paying the Ransom - Naked Security
The latest "FBI Lock" Android ransomware reported by SophosLabs follows a familiar theme. But it has a slight sting in the tail to make it trickier to remove.
iOS Backdoors Expose Personal Data - Security Week
Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference last week.
Planes Can Be Hacked Via Inflight WiFi - CBC News
In theory, a hacker could use a plane's onboard WiFi signal or inflight entertainment system to hack into its avionics equipment, potentially disrupting or modifying satellite communications.
A "highly sophisticated Chinese state-sponsored actor" recently managed to hack into the computer systems at Canada's National Research Council, according to Canada's chief information officer, Corinne Charette.
An influential group of European neuroscientists is threatening to boycott the Human Brain Project (HBP), the hugely ambitious plan to map the entire human brain in computer models that is slated to receive up to 1 billion Euros in funding from the European Union and its member countries.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.