The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Microsoft Finally Ties the Knot with Red Hat for Linux on Azure - Network World
In a move many consider long overdue, Microsoft and Red Hat on Wednesday announced a new partnership through which Microsoft will offer Red Hat Enterprise Linux as the preferred choice for enterprise Linux workloads on Azure.
Countries are increasingly dependent on the security of maritime energy infrastructure, which is vulnerable to a range of well-known risks and threats, including terrorist attacks, piracy and natural disasters. More recently, concerns about the potential consequences of cyber attacks have become more widespread.
Deputy Secretary of Homeland Security Alejandro Mayorkas this week will meet with senior Chinese officials to discuss the implementation of a series of cybersecurity agreements reached during President Xi Jinping's state visit in September.
The Secret Pentagon Push for Lethal Cyber Weapons - Defense One
With nearly $500 million allotted, military contractors are competing for funds to develop the next big thing: computer code capable of killing.
Comcast Customer List for Sale on Dark Web - The Hill
Comcast is forcing around 200,000 customers to reset their passwords after a cache of user information showed up for sale on the Dark Web over the weekend, CSO reports.
Microsoft's getting ready to take the fight with the United States government over user data to a completely new level, as the company is ready to turn to data centers in Germany in order to block American agencies from snooping in on customers.
Updated Cryptowall Encrypts File Names, Mocks Victims - Threat Post
Cryptowall has gotten a minor, but important facelift that might make it more difficult for researchers to tear apart and for victims to recover their encrypted data without paying a ransom.
In Open Sourcing its artificial intelligence engine - freely sharing one of its most important creations with the rest of the Internet - Google showed how the world of computer software is changing.
IBM’s Brain-like Chip and the Quest for a ‘Cognitive Planet’ - Tech Republic
IBM recently announced its TrueNorth chip, which operates like a brain does. Here are the details of the chip and how IBM sees it changing the future of computing.
Congress Steps up Push for Global Cyber Laws - The Hill
Capitol Hill is increasingly concerned about the lack of international laws governing cyber war.
Multi-Platform RAT OmniRAT Used to Hijack Devices - Security Week
Researchers at Avast have conducted a brief analysis of OmniRAT, a multi-platform remote administration tool (RAT) that has been used for malicious purposes.
Backdoored Ad Library Found in Thousands of iOS Apps - Security Week
Researchers at FireEye have discovered backdoored versions of a popular ad library in thousands of iOS applications, including ones published in the Apple App Store.
Hacking Apple's IOS isn't easy. But in the world of cybersecurity, even the hardest target isn't impossible - only expensive. And the price of a working attack that can compromise the latest iPhone is apparently somewhere around $1 million.
Baidu, a Chinese search engine, is offering an SDK (software development kit), which, according to Trend Micro researchers, includes functionality that can be abused to install backdoors on users' devices.
Cisco Patches Serious Flaws in Security, Wireless Appliances - Security Week
Cisco has released software updates to address a series of critical and high severity vulnerabilities affecting some of the company's security and wireless appliances.
Hackers Claim FBI Information-Sharing Portal Breached - Gov Info Security
A group of hackers claims to have breached an FBI information-sharing portal and gained access to numerous sensitive systems, including records of individuals who have been arrested by U.S. federal agencies as well as tools for sharing information between U.S. federal agencies and partners located both domestically and abroad.
Rethinking conventional computer designs, which are decades old, the U.S. Department of Energy has set its sights on creating systems that could supplant today's PCs and servers.
Upgrading the Quantum Computer: New Architecture makes Implementation Scalable - Scientific Computing
For practical application, a particular class of quantum computers, the so-called adiabatic quantum computer, has recently generated a lot of interest among researchers and industry. It is designed to solve real-world optimization problems conventional computers are not able to tackle.
"Spooky action at a distance," Einstein's famous, dismissive characterization of quantum entanglement, has long been established as a physical phenomenon, and researchers are keen to develop practical applications for entanglement including communication, encryption, and computing.
The CSIAC has produced a short follow-up on recent cybersecurity headlines. Recent advances and speculation in Quantum Computing have created many questions. A look at the NSA's Suite B cryptographic algorithms resource provides a sound reference for understanding the current state of the industry. However, scientific breakthroughs continue to be a driving force in the Quantum Computing realm.
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.