The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Hackers broke into U.S. government computers, possibly compromising the personal data of 4 million current and former federal employees, and investigators were probing whether the culprits were based in China.
Countries express concern over 'growing level of sophistication' of cyber threats.
Defense Department 'should expect cyber attacks to be part of all conflicts in the future.'
Computers are more efficient than humans, especially when it comes to calculations, and humans can reason and adapt at lightning speed, a task still beyond most algorithms. But researchers are developing tools to improve man-machine interfaces - to the benefit of both.
Russian Crypto-Malware Encrypts Files Completely - Softpedia
The operators of a new piece of ransomware originating from Russia keep open a communication channel with victims for payment instructions, but this also means there's a possibility for bargaining.
In an unprecedented move, the author of a piece of ransomware with file encryption routines has released the database with the decryption keys for the data locked on the infected computers and issued an apology.
A Commerce Department standards body has released preliminary guidelines for masking the personal data of individuals captured by traffic sensors, speed cameras and other Internet-connected government systems.
A report from TrapX found that a majority of organizations are vulnerable, if not already victim to MEDJACK, or "medical device hijack."
Total Cost of Average Data Breach Reaches $3.8 Million - Net-Security
The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
The IRS believes that a major cyber breach that allowed criminals to steal the tax returns of more than 100,000 people originated in Russia, two sources briefed on the data theft tell CNN.
OpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found in businesses.
Congress gave final approval Tuesday to the most sweeping rollback of government surveillance powers in the post-Sept. 11 era, clearing the way for a new program that bans the National Security Agency from collecting and storing Americans' telephone dialing records.
Search-Lab, a Hungary-based security testing company that specializes in embedded systems, has identified more than 50 vulnerabilities in network-attached storage (NAS) and network video recorder (NVR) products from D-Link.
New Linux-Based Router Worm Used in Social Network Scheme - Security Week
Researchers at ESET are shining the light on a new piece of malware compromising routers in a scheme to take fraudulent actions on social networks.
Small, Mid-Sized Businesses Hit by 62% of All Cyberattacks - Property Casualty 360
Timothy Francis, enterprise lead for Cyber insurance, noted that although most of the cyber breaches that make the headlines are from large, national companies, the smaller breaches of local companies are far greater in number.
Protocol Corrects Virtually all Errors in Quantum Memory, but Requires Little Measure of Quantum States - Phys
A new quantum error correcting code requires measurements of only a few quantum bits at a time, to ensure consistency between one stage of a computation and the next.
Apple Vulnerability Could Allow Firmware Modifications - Network World
A zero-day software vulnerability in the firmware of older Apple computers could be used to slip hard-to-remove malware onto a computer, according to a security researcher.
The IRS failed to implement dozens of security upgrades to its computer systems, some of which could have made it more difficult for hackers to use an IRS website to steal tax information from 104,000 taxpayers.
Threat Intelligence Platforms: The Next “Must-Have” For Harried Security Operations Teams - Dark Reading
New category of technology promises to aggregate all threat intelligence feeds and help security teams find the attacks that could cause the most damage.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.