The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
The Energy Department wants to know whether it's feasible to build a system of reserve power transformers, in case the nation's power systems are virtually or physically infiltrated.
A major cyber attack on the U.S. electric grid could cause over a $1 trillion in economic impact and roughly $71.1 billion in insurance claims.
US Army Seeks Leap-Ahead Cyber Defense Tech - Defense News
The US Army is seeking to equip its cyber warriors with cutting-edge networking hardware, and it is going outside the traditional acquisitions system to do it.
The Air Force released a vision document June 22 written by its former chief scientist which helps define a path to increased and effective autonomy.
Tags: Autonomy and Autonomous Systems
If the Chinese government is in fact behind the OPM hack, it would not be their boldest alleged move in cyberspace; only the most recent.
FBI Alert Details Malware Tied to the OPM and Anthem Attacks - Computer World
The FBI released a memo earlier this month outlining the malware used in the attack, which has ties to the attack at Anthem.
PCI Council Updates Point-to-Point Encryption Standard - Security Week
The Payment Card Industry Security Standards Council (PCI SSC) announced this week an update to the Point-to-Point Encryption (P2PE) standard.
Pentagon, OPM Shut Down Background Check Systems - Defense One
The U.S. Department of Defense Joint Personnel Adjudication System was taken offline following the Office of Personnel Management's (OPM) June 29 announcement that the e-QIP system would be offline 4-6 weeks for security improvements.
FFIEC Cybersecurity Assessment ‘Tool’ Goes Live - American Banker
Federal regulators on Tuesday unveiled a much-anticipated tool meant to help institutions assess their own cybersecurity systems.
Threats considered a non-priority by security experts can quickly transform into a serious reason of concern, as they can represent the starting point of a more elaborate cybercriminal assault, researchers have found.
Uncle Sam Wants Your Ideas For Stopping Drones: Black Dart Tests - Breaking Defense
From July 27 through Aug. 6, the Defense Department is going to conduct a counter-drone testfest and failure is an option.
The mobile rush raises legal questions and blurs the line between work and private time, and already some governments have acted swiftly in ensuring employers don't ask too much of employees.
4,900 New Android Malware Strains Discovered Every Day - Net-Security
Security experts discovered 440,267 new Android malware strains in the first quarter of 2015, which means that a new mobile malware strain for Android was discovered every 18 seconds.
Security researchers found a security flaw in Debuggerd, the debugging component integrated in Android operating system, which could be combined with other bugs to achieve arbitrary code execution on the device.
Flaw in 802.11n Standard Exposes Wireless Networks to Attacks - Security Week
A vulnerability in the 802.11n wireless networking standard can be exploited by a remote attacker to target wireless networks, researchers have warned.
Default SSH Keys Expose Cisco’s Virtual Security Appliances - Security Week
Cisco warned on Thursday that as a result of default encryption keys in three of its security products, customers are at risk of an unauthenticated remote attacker being able intercept traffic or gain access to vulnerable systems with root privileges.
NSA Joins Github, Shares Code for Cyber Tool - Next Gov
The National Security Agency is sharing the code for a network security monitoring system on GitHub.
Agriculture companies are now buying cyber-surveillance gear fueled by National Security Agency intelligence, according to a telecommunications company authorized to sell the technology to government and industry.
U.S. Government Wades Into Vulnerability Disclosure - Threat Post
Security researchers and software vendors have spent decades trying to work out the process of vulnerability disclosure, with limited success. Now the federal government is joining the fray in hopes of getting the two sides to play nice.
A zero-day Flash Player vulnerability, patched today by Adobe, is currently being exploited by an advanced threat group from China in cyber-espionage operations.
Lack of specialized training for developers and crypto libraries that are too complex lead to widespread encryption failures.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.