The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
As Sony Pictures looks for a possible North Korea link to a cyberattack, there's a nagging question. Does the poor country even have advanced technology capabilities to infiltrate a large corporation?
The FBI on Sunday issued the strongest warning to date about possible attacks by the ISIS terrorist group against the U.S. military inside the homeland.
Google announced it is rolling out a simple one click solution for websites that use its "No CAPTCHA" service to weed out spam from bots.
Forensics experts hired by Sony Corp to investigate the massive cyber attack at its Hollywood studio said the breach was unprecedented, well-planned and carried out by an "organized group."
The Federal Bureau of Investigation warned U.S. businesses that hackers have used malicious software to launch a destructive cyberattack in the United States.
Sony Pictures Malware Tied to Seoul, “Shamoon” Cyber-Attacks - ARS Technica
Elements of the attacks show a common playbook and possibly a common toolkit.
Regin: Nation-State Ownage of GSM Networks - SecureList
For the past two years, Kaspersky Lab's been tracking this most elusive malware across the world.
As companies plan for 2015, it is an ideal time to look back at lessons learned in cyber security during 2014.
Defense Bill Mandates Cyberattack Reporting - The Hill
House and Senate negotiators agreed to retain language in the Defense authorization bill that would enhance cyberattack reporting requirements for large defense contractors.
DOJ to Create Dedicated Cybersecurity Unit - The Hill
The Justice Department is creating a dedicated cybersecurity unit within its criminal division.
The Department of Homeland Security is poised to ditch all records from a controversial network monitoring system called Einstein that are at least three years old, but not for security reasons.
In 2012 quantum physicists pulled off an acclaimed success in quantum-based factoring, running an adiabatic quantum algorithm for the number 143, at the time believed to be the largest number ever factored in a quantum computation. Now seems that paper, here, could have overlooked something.
An international research team headed by SISSA has just published a study that establishes a basic characteristic that universal quantum simulators should possess.
Engineers have now developed a chip on which both sound waves and light waves are generated and confined together so that the sound can efficiently control the light.
The Cyber Shield Newsletter - New Mexico Counterintelligence Working Group (NMCIWG)
The Cyber Shield is a Cyber Newsletter for Counterintelligence, IT and Security Professionals associated with DoD and USG agencies. There are no distribution constraints. If you would like to subscribe, please contact Paul Losiewicz at firstname.lastname@example.org
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.