• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ CS Digests / 26 Jun 2018

CS Digest: 26 Jun 2018

Posted: 06/26/2018 | Leave a Comment

The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.

CSIAC ANNOUNCEMENTS:

In Case You Missed It: CSIAC Webinar – The Knowledge Temple - CSIAC

In this webinar, Neil Fitzpatrick, Senior Knowledge Manager at Quanterion Solutions Inc., uses the analogy of the construction of a Greek temple to identify the components and processes involved in the development of an efficient and effective organizational data to decision model.

Watch the Previous Webinar – Cybersecurity for Energy Systems - CSIAC

This presentation will review various Cybersecurity for Energy Delivery Systems (CEDS) R&D projects in which Schweitzer Engineering Laboratories (SEL) has been involved including an overview of Operational Technology-Software Defined Networking (OT-SDN).

RECENT HEADLINES:

Cyberwarfare:

New Fears Over Chinese Espionage Grip Washington - The Hill

Fresh concerns over Chinese espionage are gripping Washington as lawmakers fear Beijing is gaining sensitive details on U.S. technologies.

Data Security:

New SamSam Variant Requires Special Password Before Infection - Bleeping Computer

New versions of the SamSam ransomware will not execute unless the person running the malware's payload enters a special password via the command-line.

75% of Malware Uploaded on “No-Distribute” Scanners Is Unknown to Researchers - Bleeping Computer

Three-quarters of malware samples uploaded to "no-distribute scanners" are never shared on "multiscanners" like VirusTotal, and hence, they remain unknown to security firms and researchers for longer periods of time.

Equifax Reveals Full Horror of That Monstrous Cyber-heist of its Servers - The Register

Equifax has published yet more details on the personal records and sensitive information stolen by miscreants after they hacked its databases in 2017.

Legislation and Regulation:

Congress Lays Out Tech Funding in Spending Bills and Focuses on Supply Chain Threats - NextGov

The Senate Appropriations subcommittees forwarded a smorgasbord of funding bills to the full committee last week. Here's a rundown.

Supreme Court Rules that Warrants Generally Are Required to Collect Cellphone Data - NY Times

In a major statement on privacy in the digital age, the Supreme Court ruled on Friday that the government generally needs a warrant to collect troves of location data about the customers of cellphone companies.

Machine Learning and Artificial Intelligence:

A Bot Backed by Elon Musk Has Made an AI Breakthrough in Video Game World - Bloomberg

Artificial-intelligence research group OpenAI said it created software capable of beating teams of five skilled human players in the video game Dota 2, a milestone in computer science.

This Japanese AI Security Camera Shows the Future of Surveillance Will be Automated - The Verge

The world of automated surveillance is booming, with new machine learning techniques giving CCTV cameras the ability to spot troubling behavior without human supervision. And sooner or later, this tech will be coming to a store near you - as illustrated by a new AI security cam built by Japanese telecom giant NTT East and startup Earth Eyes Corp.

New IBM Robot Holds its Own in a Debate with a Human - NBC News

The human brain may be the ultimate super computer, but artificial intelligence is catching up so fast that it can now hold a substantive debate with a human.

MIT Fed an AI Data From Reddit, and Now it Only Thinks About Murder - The Verge

This week, researchers at MIT unveiled their latest creation: Norman, a disturbed AI.

Mobile Security:

Thousands of Mobile Apps Leak Data from Firebase Databases - Security Week

Thousands of mobile applications running on iOS and Android have exposed over 113 gigabytes of data from 2,300 unsecured Firebase databases, enterprise mobile security firm Appthority says in a new report.

A Volt Out of the Blue: Phone Batteries Reveal What You Typed and Read - The Register

A group of researchers has demonstrated that smartphone batteries can offer a side-channel attack vector by revealing what users do with their devices through analysis of power consumption.

Network Security:

New WPA3 Wi-Fi Standard Released - Bleeping Computer

On Monday, the Wi-Fi Alliance, the organization that manages Wi-Fi technologies, announced the official release of WPA3. WPA3 is the latest version of Wi-Fi Protected Access (WPA), a user authentication technology for Wi-Fi connections.

Public Sector:

Most Major US Agencies Are Now Feeding the Federal Cyber Threat Dashboard - Defense One

A Homeland Security Department dashboard designed to collect and analyze cybersecurity information from across the government is now receiving data from 20 out of 23 major civilian agencies, a department official said Wednesday.

Software Security:

Android P Will Encourage OEMs to Adopt Stronger Biometric Systems - Toms Hardware

Starting with Android P, device makers will have to pass new security-focused benchmarks for their biometric authentication systems if they want their customers to have a better biometric authentication experience.

Microsoft Edge Bug Exposes Content From Other Sites via HTML5 Audio Tag - Bleeping Computer

A weird Edge bug that was fixed earlier this month, allows a malicious website to retrieve content from other sites by playing audio files in a malformed manner that produces unintended consequences.

CSIAC Supported Communities

CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.

Technical Resources, Policy and Guidance

This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.


The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.

« 12 Jun 2018
10 Jul 2018 »

Reader Interactions

Leave a Comment Cancel

You must be logged in to post a comment.

sidebar

Blog Sidebar

Featured Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

CSIAC Journal - Launching Innovation Through Medical Modeling and Simulation Technologies

CSIAC Journal Cover Volume 5 Number 4

This Special Edition of the Journal will provide a glimpse into current efforts to improve military medical training with simulation-based solutions.

Read the Journal

CSIAC Journal - Innovation Based Ecosystems

CSIAC Journal Cover Volume 5 Number 4

This issue of the Journal of Cyber Security & Information Systems explores how managing fast adoption modern-based system has more to do with understanding capabilities, interdependency between systems and effectively operating in the new paradigm than it has to do with differentiating product features.

Read the Journal

Recent Video Podcasts

  • What is DevOps? from a tools point of view Series: CSIAC Webinars
  • 5th Generation (5G) Technology Series: The CSIAC Podcast
  • Malvertising Explored Series: The CSIAC Podcast
  • Cybersecurity Arms Race – Modernizing the Arsenal Series: CSIAC Webinars
  • Cyber Situational Awareness Series: The CSIAC Podcast
View all Podcasts

Upcoming Events

Thu 28

BSides Columbus 2019

February 28 - March 1
Columbus OH
United States
Organizer: BSides Columbus
Mar 19

1st NATO – Industry Workshop on Autonomous Cyber Defence

March 19 @ 09:30 - 16:00 EDT
Cranfield Bedfordshire MK43 0AL
United Kingdom
Organizer: Cranfield University
View all Events

Recently Active Members

Profile picture of kirbyw3
Profile picture of CSIACAdmin
Profile picture of sarapistor
Profile picture of awebb19
Profile picture of SChhom02
Profile picture of emuslic03
Profile picture of nd14
Profile picture of Parlad
Profile picture of lebanghart
Profile picture of Mathieu Schram
Profile picture of aedrgad
Profile picture of nrea13
Profile picture of scottrill10
Profile picture of jburkhart04
Profile picture of woo05
Profile picture of mselby08
Profile picture of jlewis05
Profile picture of mvansteenburg

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More