The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
This video discusses the Rust Language Ownership model which uses a type safety policy for avoiding undefined program behavior. The Rust type system ensures memory safety and prevents data races in multi-thread programs. The language rules for program variable (data) mutation, and the differences between value copies and moves is discussed in detail. Variable data is, by default, immutable. Variables must be annotated with the "mut" keyword in order to be modified.
This presentation begins with a brief summary of Rust's features and the needs that motivate them. It then focuses on one particular important feature-set, Rust's error handling mechanisms. The discussion provides code snippets that illustrate how error handling works in Rust with annotated comments, accompanied by discussion explaining code operations. Links will be provided for the complete working code examples.
Tags: CSIAC Webinar, Rust Programming Language
This video provides an introduction and a brief overview of the Rust Programming Language. It covers the prerequisites required for getting started. This includes: the setup of a development environment using Visual Studio Code, and the Rust package manager and build tool known as "Cargo."
Tags: CSIAC Webinar, Rust Programming Language
Google was sued on Tuesday in a proposed class action accusing the internet search company of illegally invading the privacy of millions of users by pervasively tracking their internet use through browsers set in "private" mode.
Tags: Data Privacy, Google, Google Chrome
After the death of George Floyd and the subsequent protests across the U.S., cyberattacks on advocacy groups spiked by an astonishing 1,120 times. It's unclear who is behind the attacks, but they included attempts to neuter anti-racist organizations' freedom of speech.
Tags: BLM, DDoS
As Amazon Face Recognition Tool Mismatches Politicians With Mugshots, Research Finds It Working Worse Than 2 Years Ago - Fork Log
Tests performed by Comparitech showed that Amazon's face recognition technology incorrectly matched over a hundred of the United States and United Kingdom politicians with photos of arrested people.
Tags: Amazon, Privacy Protection
It’s not every day the NSA publicly warns of attacks by Kremlin hackers – so take this critical Exim flaw seriously - The Register
The NSA has raised the alarm over what it says is Russia's active exploitation of a remote-code execution flaw in Exim for which a patch exists.
Tags: Exim, Exploit, National Security Agency (NSA), Russia GRU
The NCCoE Announces Technology Collaborators for Protecting Information and System Integrity in Industrial Control System Environments Project - NCCoE
The National Cybersecurity Center of Excellence (NCCoE) has invited ten technology providers and industry experts to collaborate on the Protecting Information and System Integrity in Industrial Control System Environments Project.
Only around a third of users usually change their passwords following a data breach announcement, according to a recent study published by academics from the Carnegie Mellon University's Security and Privacy Institute (CyLab).
Tags: Data Breach, Password Security
A new research has revealed that 80% of organizations suffered at least one cloud data breach in the past 18 months, while 43% of companies reported 10 or more cloud data breaches.
Tags: Cloud Security, Data Breach
Hackers have stolen confidential documents from a US military contractor which provides critical support for the country's Minuteman III nuclear deterrent, Sky News has learnt.
Tags: Data Breach, Defense Contractors
The US Department of Defense is woefully behind on its plan to upgrade its IT infrastructure to support the newer IPv6 protocol, according to a government report published on Monday.
Tags: Department of Defense (DoD), IPv6
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.