• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ CS Digests / 17 Nov 2015

CS Digest: 17 Nov 2015

Posted: 11/17/2015 | Leave a Comment

The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.

RECENT HEADLINES:

Cloud Computing:

Microsoft Finally Ties the Knot with Red Hat for Linux on Azure - Network World

In a move many consider long overdue, Microsoft and Red Hat on Wednesday announced a new partnership through which Microsoft will offer Red Hat Enterprise Linux as the preferred choice for enterprise Linux workloads on Azure.

Critical Infrastructure:

Emerging Threats to Maritime Energy Infrastructure - NATO

Countries are increasingly dependent on the security of maritime energy infrastructure, which is vulnerable to a range of well-known risks and threats, including terrorist attacks, piracy and natural disasters. More recently, concerns about the potential consequences of cyber attacks have become more widespread.

Cyberwarfare:

DHS Deputy to Meet with Chinese Officials Over Hacking - The Hill

Deputy Secretary of Homeland Security Alejandro Mayorkas this week will meet with senior Chinese officials to discuss the implementation of a series of cybersecurity agreements reached during President Xi Jinping's state visit in September.

The Secret Pentagon Push for Lethal Cyber Weapons - Defense One

With nearly $500 million allotted, military contractors are competing for funds to develop the next big thing: computer code capable of killing.

Data Security:

Comcast Customer List for Sale on Dark Web - The Hill

Comcast is forcing around 200,000 customers to reset their passwords after a cache of user information showed up for sale on the Dark Web over the weekend, CSO reports.
Tags: Dark Web

Microsoft to Host Data in Germany to Block the US from Spying on Its Users - Softpedia

Microsoft's getting ready to take the fight with the United States government over user data to a completely new level, as the company is ready to turn to data centers in Germany in order to block American agencies from snooping in on customers.

Updated Cryptowall Encrypts File Names, Mocks Victims - Threat Post

Cryptowall has gotten a minor, but important facelift that might make it more difficult for researchers to tear apart and for victims to recover their encrypted data without paying a ransom.

High Performance Computing:

TensorFlow, Google’s Open Source AI, Signals Big Changes in Hardware Too - Wired

In Open Sourcing its artificial intelligence engine - freely sharing one of its most important creations with the rest of the Internet - Google showed how the world of computer software is changing.

IBM’s Brain-like Chip and the Quest for a ‘Cognitive Planet’ - Tech Republic

IBM recently announced its TrueNorth chip, which operates like a brain does. Here are the details of the chip and how IBM sees it changing the future of computing.

Legislation and Regulation:

Congress Steps up Push for Global Cyber Laws - The Hill

Capitol Hill is increasingly concerned about the lack of international laws governing cyber war.

Mobile Security:

Multi-Platform RAT OmniRAT Used to Hijack Devices - Security Week

Researchers at Avast have conducted a brief analysis of OmniRAT, a multi-platform remote administration tool (RAT) that has been used for malicious purposes.

Backdoored Ad Library Found in Thousands of iOS Apps - Security Week

Researchers at FireEye have discovered backdoored versions of a popular ad library in thousands of iOS applications, including ones published in the Apple App Store.

Hackers Claim Million-Dollar Bounty for iOS Zero Day Attack - Wired

Hacking Apple's IOS isn't easy. But in the world of cybersecurity, even the hardest target isn't impossible - only expensive. And the price of a working attack that can compromise the latest iPhone is apparently somewhere around $1 million.

100 Million Android Users May Have a Backdoor on Their Device Thanks to the Baidu SDK - Softpedia

Baidu, a Chinese search engine, is offering an SDK (software development kit), which, according to Trend Micro researchers, includes functionality that can be abused to install backdoors on users' devices.

Network Security:

Cisco Patches Serious Flaws in Security, Wireless Appliances - Security Week

Cisco has released software updates to address a series of critical and high severity vulnerabilities affecting some of the company's security and wireless appliances.

Public Sector:

Hackers Claim FBI Information-Sharing Portal Breached - Gov Info Security

A group of hackers claims to have breached an FBI information-sharing portal and gained access to numerous sensitive systems, including records of individuals who have been arrested by U.S. federal agencies as well as tools for sharing information between U.S. federal agencies and partners located both domestically and abroad.

Quantum Computing:

Moving Past PCs: Government Lab Dabbles in Quantum Computers and Brain-like Chips - PC World

Rethinking conventional computer designs, which are decades old, the U.S. Department of Energy has set its sights on creating systems that could supplant today's PCs and servers.

Upgrading the Quantum Computer: New Architecture makes Implementation Scalable - Scientific Computing

For practical application, a particular class of quantum computers, the so-called adiabatic quantum computer, has recently generated a lot of interest among researchers and industry. It is designed to solve real-world optimization problems conventional computers are not able to tackle.

Researchers Take two big Steps Toward Quantum Computing - Phys

"Spooky action at a distance," Einstein's famous, dismissive characterization of quantum entanglement, has long been established as a physical phenomenon, and researchers are keen to develop practical applications for entanglement including communication, encryption, and computing.

FEEDBACK FROM PREVIOUS DIGEST:

Video Follow-ups:

Quantum Computing vs Encryption Update - CSIAC

The CSIAC has produced a short follow-up on recent cybersecurity headlines. Recent advances and speculation in Quantum Computing have created many questions. A look at the NSA's Suite B cryptographic algorithms resource provides a sound reference for understanding the current state of the industry. However, scientific breakthroughs continue to be a driving force in the Quantum Computing realm.
Tags: Quantum Computing

CSIAC SUPPORTED COMMUNITIES:

Cyber Community of Interest (COI) Group - CSIAC

The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.


The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.

« 03 Nov 2015
01 Dec 2015 »

Reader Interactions

Leave a Comment Cancel

You must be logged in to post a comment.

sidebar

Blog Sidebar

Featured Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

CSIAC Report - Smart Cities, Smart Bases and Secure Cloud Architecture for Resiliency by Design

Integration of Smart City Technologies to create Smart Bases for DoD will require due diligence with respect to the security of the data produced by Internet of Things (IOT) and Industrial Internet of Things (IIOT). This will increase more so with the rollout of 5G and increased automation "at the edge". Commercially, data will be moving to the cloud first, and then stored for process improvement analysis by end-users. As such, implementation of Secure Cloud Architectures is a must. This report provides some use cases and a description of a risk based approach to cloud data security. Clear understanding, adaptation, and implementation of a secure cloud framework will provide the military the means to make progress in becoming a smart military.

Read the Report

Featured Subject Matter Expert (SME): Dr. Jim Fawcett

CSIAC SME and Teaching Professor Emeritus of Computer Engineering at Syracuse University, Dr. Jim Fawcett, focuses on methods and strategies for design, development, and management of large and complex distributed software systems. His work for CSIAC includes a series of video podcasts on C++ and the Rust secure programming language. He has also presented a webinar on publishing domain-specific source code for reuse and maintenance.

View SME's Contributed Content

CSIAC Journal - Data-Centric Environment: Rise of Internet-Based Modern Warfare “iWar”

CSIAC Journal Cover Volume 7 Number 4

This journal addresses a collection of modern security concerns that range from social media attacks and internet-connected devices to a hypothetical defense strategy for private sector entities.

Read the Journal

CSIAC Journal M&S Special Edition - M&S Applied Across Broad Spectrum Defense and Federal Endeavors

CSIAC Journal Cover Volume 7 Number 3

This Special Edition of the CSIAC Journal highlights a broad array of modeling and simulation contributions – whether in training, testing, experimentation, research, engineering, or other endeavors.

Read the Journal

CSIAC Journal - Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)

CSIAC Journal Cover Volume 7 Number 2

This edition of the CSIAC Journal focuses on the topic of cybersecurity of Cyber-Physical Systems (CPS), particularly those that make up Critical Infrastructure (CI).

Read the Journal

Recent Video Podcasts

  • Agile Condor: Supercomputing at the Edge for Intelligent Analytics Series: CSIAC Webinars
  • Securing the Supply Chain: A Hybrid Approach to Effective SCRM Policies and Procedures Series: The CSIAC Podcast
  • DoD Vulnerability Disclosure Program (VDP) Series: CSIAC Webinars
  • 5 Best Practices for a Secure Infrastructure Series: The CSIAC Podcast
  • Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 4 Series: Fifth Generation Cellular
View all Podcasts

Upcoming Events

Fri 15

SANS Security East 2021

January 11 - January 16
Organizer: SANS Institute
Fri 15

SANS Cloud Defender 2021

January 11 - January 16
Organizer: SANS Institute
Mon 18

SANS Stay Sharp: Blue Team Operations 2021

January 18 - January 20
Organizer: SANS Institute
Mon 18

SANS Cyber Security Central: Jan 2021

January 18 - January 23
Organizer: SANS Institute
Tue 19

AI Champions, Online – Supply Chain

January 19 @ 14:00 - January 21 @ 15:30 EST
View all Events

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.