The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
RECENT HEADLINES:
Cloud Computing:
Microsoft Finally Ties the Knot with Red Hat for Linux on Azure - Network World
In a move many consider long overdue, Microsoft and Red Hat on Wednesday announced a new partnership through which Microsoft will offer Red Hat Enterprise Linux as the preferred choice for enterprise Linux workloads on Azure.
Critical Infrastructure:
Emerging Threats to Maritime Energy Infrastructure - NATO
Countries are increasingly dependent on the security of maritime energy infrastructure, which is vulnerable to a range of well-known risks and threats, including terrorist attacks, piracy and natural disasters. More recently, concerns about the potential consequences of cyber attacks have become more widespread.
Cyberwarfare:
DHS Deputy to Meet with Chinese Officials Over Hacking - The Hill
Deputy Secretary of Homeland Security Alejandro Mayorkas this week will meet with senior Chinese officials to discuss the implementation of a series of cybersecurity agreements reached during President Xi Jinping's state visit in September.
The Secret Pentagon Push for Lethal Cyber Weapons - Defense One
With nearly $500 million allotted, military contractors are competing for funds to develop the next big thing: computer code capable of killing.
Data Security:
Comcast Customer List for Sale on Dark Web - The Hill
Comcast is forcing around 200,000 customers to reset their passwords after a cache of user information showed up for sale on the Dark Web over the weekend, CSO reports.
Tags: Dark Web
Microsoft to Host Data in Germany to Block the US from Spying on Its Users - Softpedia
Microsoft's getting ready to take the fight with the United States government over user data to a completely new level, as the company is ready to turn to data centers in Germany in order to block American agencies from snooping in on customers.
Updated Cryptowall Encrypts File Names, Mocks Victims - Threat Post
Cryptowall has gotten a minor, but important facelift that might make it more difficult for researchers to tear apart and for victims to recover their encrypted data without paying a ransom.
High Performance Computing:
TensorFlow, Google’s Open Source AI, Signals Big Changes in Hardware Too - Wired
In Open Sourcing its artificial intelligence engine - freely sharing one of its most important creations with the rest of the Internet - Google showed how the world of computer software is changing.
IBM’s Brain-like Chip and the Quest for a ‘Cognitive Planet’ - Tech Republic
IBM recently announced its TrueNorth chip, which operates like a brain does. Here are the details of the chip and how IBM sees it changing the future of computing.
Legislation and Regulation:
Congress Steps up Push for Global Cyber Laws - The Hill
Capitol Hill is increasingly concerned about the lack of international laws governing cyber war.
Mobile Security:
Multi-Platform RAT OmniRAT Used to Hijack Devices - Security Week
Researchers at Avast have conducted a brief analysis of OmniRAT, a multi-platform remote administration tool (RAT) that has been used for malicious purposes.
Backdoored Ad Library Found in Thousands of iOS Apps - Security Week
Researchers at FireEye have discovered backdoored versions of a popular ad library in thousands of iOS applications, including ones published in the Apple App Store.
Hackers Claim Million-Dollar Bounty for iOS Zero Day Attack - Wired
Hacking Apple's IOS isn't easy. But in the world of cybersecurity, even the hardest target isn't impossible - only expensive. And the price of a working attack that can compromise the latest iPhone is apparently somewhere around $1 million.
100 Million Android Users May Have a Backdoor on Their Device Thanks to the Baidu SDK - Softpedia
Baidu, a Chinese search engine, is offering an SDK (software development kit), which, according to Trend Micro researchers, includes functionality that can be abused to install backdoors on users' devices.
Network Security:
Cisco Patches Serious Flaws in Security, Wireless Appliances - Security Week
Cisco has released software updates to address a series of critical and high severity vulnerabilities affecting some of the company's security and wireless appliances.
Public Sector:
Hackers Claim FBI Information-Sharing Portal Breached - Gov Info Security
A group of hackers claims to have breached an FBI information-sharing portal and gained access to numerous sensitive systems, including records of individuals who have been arrested by U.S. federal agencies as well as tools for sharing information between U.S. federal agencies and partners located both domestically and abroad.
Quantum Computing:
Moving Past PCs: Government Lab Dabbles in Quantum Computers and Brain-like Chips - PC World
Rethinking conventional computer designs, which are decades old, the U.S. Department of Energy has set its sights on creating systems that could supplant today's PCs and servers.
Upgrading the Quantum Computer: New Architecture makes Implementation Scalable - Scientific Computing
For practical application, a particular class of quantum computers, the so-called adiabatic quantum computer, has recently generated a lot of interest among researchers and industry. It is designed to solve real-world optimization problems conventional computers are not able to tackle.
Researchers Take two big Steps Toward Quantum Computing - Phys
"Spooky action at a distance," Einstein's famous, dismissive characterization of quantum entanglement, has long been established as a physical phenomenon, and researchers are keen to develop practical applications for entanglement including communication, encryption, and computing.
FEEDBACK FROM PREVIOUS DIGEST:
Video Follow-ups:
Quantum Computing vs Encryption Update - CSIAC
The CSIAC has produced a short follow-up on recent cybersecurity headlines. Recent advances and speculation in Quantum Computing have created many questions. A look at the NSA's Suite B cryptographic algorithms resource provides a sound reference for understanding the current state of the industry. However, scientific breakthroughs continue to be a driving force in the Quantum Computing realm.
Tags: Quantum Computing
CSIAC SUPPORTED COMMUNITIES:
Cyber Community of Interest (COI) Group - CSIAC
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.