The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
The U.S. Navy is working hard to improve the cyber security of its computer networks and weapon and communications systems, whilst bracing for potential attacks on power grids and fuel supplies.
Penn State College Of Engineering Network Disabled Following Two “Incredibly Serious” Cyber Attacks - Forbes
In response to two "incredibly serious" cyber attacks against its network, Penn State announced Friday that it has taken its College of Engineering network offline. At least one of the attacks originated in China.
ISIS Preps for Cyber War - The Hill
Islamic terrorists are stoking alarm with threats of an all-out cyber crusade against the United States, and experts say the warnings should be taken seriously.
The United States said on Friday it has asked Beijing to investigate reports that Chinainterfered with Internet content hosted outside the country and used it to attack U.S. websites.
CoinVault Authors Release New Ransomware - Softpedia
The creators of the CoinVault ransomware with file encryption capabilities have come up with a replacement, changing the name to BitCryptor and the UI for the ransom message to reflect the new malware.
St. Louis Fed Confirms Cyberattack - The Hill
The Federal Reserve Bank of St. Louis has confirmed a cyberattack that rerouted users from the the bank's online research pages to spoofed sites the hackers had set up.
A simple browser plug-in was all you needed to gain access to the internet giant's customer accounts.
Secom Security Drone Follows, Photographs Intruders - Network World
Japanese security company Secom is launching a drone that will automatically launch when an intruder is detected and follow him or her while sending video to human supervisors.
mSpy Finally Admits They’ve Been Hacked - Net-Security
Officials from mSpy announced that their servers had been breached, and that data from 80,000 customers could have been stolen and leaked on the Dark Web.
Researchers at the University of Cambridge have conducted a detailed analysis of the "Factory Reset" feature in Android devices and determined that it's not as effective as it should be.
With the threat of powerful intelligence agencies, like the NSA, looming large, researchers have built a new Tor client called Astoria designed specifically to make eavesdropping harder for the world's richest, most aggressive, and most capable spies.
Cybercriminals take advantage of tens of thousands of insecure home routers distributed by ISPs (Internet Service Providers) and manufacturers to create large botnets for distributed denial-of-service (DDoS) attack purposes.
FireEye and ACE Group Announce Strategic Alliance to Mitigate Cyber Risk - Digital Journal
The relationship brings together expert technical insight from FireEye to assess an individual organization's threat exposure, with ACE's Loss Mitigation Services program, a multi-tier offering that helps organizations fully understand and mitigate their cyber security risk.
ISC Study Shows Decline in US Cybersecurity Readiness - Executive Gov
A new ISC study indicates that the federal government's efforts in recent years to bolster cybersecurity have seen little return on investment.
A security researcher kicked off a United Airlines flight last month after tweeting about security vulnerabilities in its system had previously taken control of an airplane and caused it to briefly fly sideways.
On May 11, Greg Kroah-Hartman announced the immediate availability for download of Linux kernel 3.19.8, while informing users that the Linux 3.19 kernel branch reached end of life and they should move to the Linux kernel 4.0.x series as soon as possible.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.