The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
In this webinar, Neil Fitzpatrick, Senior Knowledge Manager at Quanterion Solutions Inc., uses the analogy of the construction of a Greek temple to identify the components and processes involved in the development of an efficient and effective organizational data to decision model.
Hackers working for Russia were able to gain access to the control rooms of US electric utilities last year, allowing them to cause blackouts, federal officials tell the Wall Street Journal.
Recently installed NSA and Cyber Command chief Paul Nakasone has created a dedicated task force (the Russia Small Group) to tackle online threats from Putin's regime. While he wasn't specific about what the group would do, he said it was "in line" with what intelligence agencies have been doing ever since the 2016 presidential election.
Smart Installations in Army’s Future - Ft. Meade Soundoff
In the future, Army installations could employ artificial intelligence, cloud computing, data analytics and other technological advancements.
Many Bluetooth Implementations and OS Drivers Affected by Crypto Bug - Bleeping Computer
A cryptographic bug affects the Bluetooth implementations and operating system drivers of Apple, Broadcom, Intel, Qualcomm, and possibly other hardware vendors.
Today, Google, Facebook, Microsoft, and Twitter joined to announce a new standards initiative called the Data Transfer Project, designed as a new way to move data between platforms. In a blog post, Google described the project as letting users "transfer data directly from one service to another, without needing to download and re-upload it."
Hackers have stolen the health records of 1.5 million Singaporeans including Prime Minister Lee Hsien Loong, authorities said Friday, with the leader specifically targeted in the city-state's biggest ever data breach.
Online investigations outfit Bellingcat has found that fitness tracking kit-maker Polar reveals both the identity and daily activity of its users - including soldiers and spies.
Half a Billion IoT Devices Vulnerable to DNS Rebinding Attacks - Bleeping Computer
Armis, the cyber-security firm that discovered the BlueBorne vulnerabilities in the Bluetooth protocol, warns that nearly half a billion of today's "smart" devices are vulnerable to a decade-old attack known as DNS rebinding.
FBI Director Christopher Wray said Wednesday that unless the U.S. government and private industry are able to come to a compromise on the issue of default encryption on consumer devices, legislation may be how the debate is ultimately decided.
European antitrust regulators fined Google a record 4.34 billion euro ($5 billion) on Wednesday and ordered it to stop using its popular Android mobile operating system to block rivals, a ruling which the U.S. tech company said it would appeal.
DARPA today announced its Artificial Intelligence Exploration (AIE) program, a key component of the agency's broader artificial intelligence (AI) investment strategy aimed at ensuring the United States maintains an advantage in this critical and rapidly accelerating technology area.
Droppers Is How Android Malware Keeps Sneaking Into the Play Store - Bleeping Computer
For the past year, Android malware authors have been increasingly relying on a solid trick for bypassing Google's security scans and sneaking malicious apps into the official Play Store.
There's a lot of pieces that need to come together to get 5G networks to work on mobile devices - new standards need to be agreed on, new modems need to be developed, and new networking hardware for towers needs to be rolled out. But Qualcomm might have just cleared one of the major hurdles with the announcement of its new QTM052 mmWave antenna modules, the first that have been announced that will enable the high-speed swath of networking spectrum to work with mobile phones.
A new Spectre-class attack called SpectreRSB has been revealed by researchers.
Police in Detroit are looking for two suspects who allegedly managed to hack a gas pump and steal over 600 gallons of gasoline, valued at about $1,800. The theft took place in the middle of the day and went on for about 90 minutes, with the gas station attendant unable to thwart the hackers.
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.