The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
IBM Rolls Out Hybrid Cloud Security Portfolio – - Top Tech News
With data Relevant Products/Services breaches making headlines nearly every week, IBM is pressing into next-generation security Relevant Products/Services solutions with what it has deemed the industry’s first “intelligent security portfolio” for protecting people, data and apps in the cloud Relevant Products/Services.
Boeing [NYSE: BA] has proven its new anti-jamming communications technology is capable of operating as either a ground-based user terminal or satellite-based networking hub, enabling the military to send and receive secure communications at a significantly lower cost by using existing terminals and satellites.
Navy to Begin Preparations for Cyber Warfare - National Defense Magazine
U.S. warships that patrol treacherous waterways like the Strait of Hormuz are ready to respond to a wide array of threats, including underwater explosives, kamikaze boats and missile strikes. They are less prepared, though, to cope with a cyber onslaught on their computer systems.
Researchers Identify Sophisticated Chinese Cyberespionage Group - Washington Post
A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and outside China.
A new piece of malware that can spy on a user’s computer has been discovered, Wired reports, with researchers also having found a clever way for the program to communicate with its creators: Google’s popular Gmail email service.
Microsoft Releases Stopgap POODLE Protection for Internet Explorer - Computer World
Microsoft on Wednesday gave Windows customers an easier way to block attacks against Internet Explorer (IE) meant to steal browser session cookies and impersonate victims.
The U.S. Postal Service said today it has been the victim of “a cyber-security intrusion” that exposed the personal information of some 800,000 employees.
While malware attacks have been possible against jailbroken iOS devices for some time, a new piece of malware has been discovered that can infect even iPhones that have not been jailbroken.
Owners of a number of Linksys small office/home office routers have been urged last week to update their device’s firmware in order patch two vulnerabilities, one of which could allow a remote, unauthenticated attacker to read or modify sensitive information on the router, and the other could allow a local attacker to read the device’s password file.
227,747 New Malware Samples Are Created Daily - Network World
The growth of malware appears unstoppable. In total, some 20 million new strains were created worldwide in the third quarter of the year, at a rate of 227,747 new samples every day.
A cyberespionage group that has built its operations around a malware program called BlackEnergy has been compromising routers and Linux systems based on ARM and MIPS architectures in addition to Windows computers.
Cyber Attacks on U.S. Companies in 2014 - Heritage
The spate of recent data breaches at big-name companies such as JPMorgan Chase, Home Depot, and Target raises questions about the effectiveness of the private sector’s information security.
North American utilities are scouring their systems for signs of Russian malware that the U.S. government has warned could give hackers control of water treatment facilities and parts of the electrical grid.
White House Hit With What Appears To Be Sustained Cyberattack - Huffington Post
The White House computer network has been hit by what appears to be a sustained cyberattack.
China will soon have the world's most secure major computer network, making communications between Beijing and Shanghai impenetrable to hackers and giving it a decisive edge in its quiet cyberwar with the United States.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.