The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
RECENT HEADLINES:
Cloud Computing:
Big Data & IoT Incite Complexity in Semi Industry - EE Times
Moving forward, semiconductor industry trends can be predicted by the 3V model of big data -- Velocity, Variety, and Volume.
SOCOM Wants to Start Data Mining the Open Web - Military Times
U.S. Special Operations Command (SOCOM) is building an open-source data-mining program that will run automatic keyword searches across a variety of websites and databases, allowing its operators to build a better picture of their operating environment in as close to real time as possible.
Critical Infrastructure:
Why the Shipping Industry Should be Taking Cyber Threats Seriously - Read Mt
For maritime professional and organisations hacking is a real and present danger, but despite the risks many shipping companies are still lax when it comes to IT security. We discuss the reasons why, and how a change in attitude can prevent cyber risk becoming more than just a threat.
Cyberwarfare:
NAVSEA: Submarines Control Systems are at Risk for Cyber Attack - USNI News
The head of Naval Sea Systems Command (NAVSEA) warned that the U.S. Navy will have to ramp up its cyber-security efforts to secure the controls systems of its submarines.
Data Security:
Windows Zero-Day Exploited in Targeted Attacks Through PowerPoint - Security Week
Microsoft has become aware of targeted cyberattacks leveraging a new vulnerability (CVE-2014-6352) that affects most supported Windows releases, according to an advisory company published by the company on Tuesday.
Malware Directs Stolen Documents to Google Drive - Net-Security
Researchers have uncovered a new type of information-stealing malware that is apparently used in campaigns targeting government agencies and can syphon files from compromised computers to Google Drive.
Staples Investigates Possible Card Data Breach - Softpedia
Fraudulent activity has been recorded on cards belonging to customers making purchases at several Staples stores, sparkling an investigation of the office supply retailer in order to determine whether its payment systems have been compromised by cybercriminals.
Legislation and Regulation:
Obama Orders Cyber Security Changes and Beefed-Up Identity Theft Protection - Star Tribune
President Obama announced plans Friday to change all U.S. government-issued credit and debit cards to a new technology designed to foil cyber thieves, setting an example meant to inspire changes in the payment card and retail industries.
Network Security:
Attackers Change Home Routers’ DNS Settings Via Malicious Code Injected in Ads - Net-Security
Sucuri Security researchers have unearthed a malvertising campaign aimed at changing the DNS settings of home routers in order to lead users questionable and potentially malicious websites.
Russian Hackers Tracking Ukraine Crisis Used Windows Flaw to Steal NATO Secrets - Seattle Times
Russian hackers targeted sensitive documents related to the recent NATO summit in Wales, using a security flaw in Microsoft Windows that affects tens of millions of computers, according to a report by a security firm.
DHS: Attackers Hacked Critical Manufacturing Firm for Months - NextGov
An unnamed manufacturing firm vital to the U.S. economy recently suffered a prolonged hack, the Department of Homeland Security has disclosed.
Russia, China Prepare to Sign Unique Cyber Security Treaty - RT
An unprecedented treaty on cybersecurity cooperation could be signed during Vladimir Putin’s state visit to China in November, a Russian business daily reports.
Anonymous Threatens China with Massive Cyberattack: ‘Operation Hong Kong’ - Washington Times
The hacker network Anonymous is threatening the Chinese government with a campaign called “Operation Hong Kong.”
Quantum Computing:
Physicists Set New Records for Silicon Quantum Computing - Phys
Two research teams working in the same laboratories at UNSW Australia have found distinct solutions to a critical challenge that has held back the realisation of super powerful quantum computers.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.