Army leader visits, talks about growth, energy
Signal Soldiers prepare for future during training
Runners battle through post 5K in style
Join in the fight against drunk driving!
Fort Gordon operating status and schedules...
CAC ACCESS ONLY. SigKN - The Cyber/Signal FOUO Portal
Cyber Center of Excellence Cyber Center of Excellence
The Cyber COE is the Force Modernization Proponent (FMP) for cyberspace operations, signal/communications networks and information services,...
More detail
Ft. Gordon Ft. Gordon
FORT GORDON is a large, multi mission, multi-service military installation providing base services and support accross a wide spectrum of training, ...
More detail
Army Cyber Command Army Cyber Command
ARCYBER plans, coordinates, integrates,  synchronizes, directs, and conducts network operations and defense of all Army networks; ...
More detail

Cyber News

- [AUG 27, 2014 - FoxNews] The National Security Agency’s surveillance machinery is again in the spotlight after a media report claimed that it is secretly providing data to almost two dozen U.S....
- [AUG 27, 2014 - WCSH-TV 6 (NBC)] With hacking becoming an increasing problem in the digital age, some schools are implementing cybersecurity curriculum to prepare the future workforce on data theft...
- [AUG 27, 2014 - Wall Street Journal] The old truism that people speak more freely online than they would face to face isn’t always true — at least when it comes to talking about the NSA....
- [AUG 27, 2014 - Wall Street Journal] The old truism that people speak more freely online than they would face to face isn’t always true — at least when it comes to talking about the NSA....
- [AUG 27, 2014 - KETV-TV] The former acting director of cybersecurity at the U.S. Department of Health and Human Services has been convicted on child pornography charges by a federal jury in the...
- [AUG 27, 2014 - KETV-TV] The former acting director of cybersecurity at the U.S. Department of Health and Human Services has been convicted on child pornography charges by a federal jury in the...
- [AUG 27, 2014 - KETV-TV] The former acting director of cybersecurity at the U.S. Department of Health and Human Services has been convicted on child pornography charges by a federal jury in the...
- [AUG 26, 2014 - USA Today] The National Security Agency built its own search engine and shares hundreds of billions of digital records with federal law enforcement and several other U.S. government...
- [AUG 26, 2014 - Forbes] Government contractors are attractive targets for cyber attacks because the U.S. federal government – the largest producer, collector, consumer, and disseminator of data in...
- [AUG 26, 2014 - Forbes] Michael Daniel, the White House cybersecurity coordinator or “cyber czar”, made comments recently that being a coder or “being too down in the weeds at the technical...

Vulnerabilities

- 09.10.13 BACKGROUND Adobe Shockwave Player is a popular Web browser plug-in. It is available for multiple Web browsers and platforms, including Windows, and MacOS. Shockwave Player enables Web browsers to display rich multimedia content in the ...
- 09.10.13 BACKGROUND Microsoft Windows is an operating system produced by Microsoft. More information can be found at the following vendor's website: http://windows.microsoft.com DESCRIPTION Remote exploitation of a design error in Microsoft Corp.'s Windows handling of theme files could allow an attacker to execute arbitrary code with...
- 07.16.13 BACKGROUND Oracle's JRE is a platform that supports the execution of programs developed using the Java programming language. It is available for multiple platforms, including Windows, Linux and Mac OS. The JRE platform also supports Java Applets, which can be loaded from Web pages. For more information, please visit the vendor's...
- 07.09.13 BACKGROUND Internet Explorer (IE) is a graphical Web browser developed by Microsoft Corp. that has been included with Microsoft Windows since 1995. For more information about Internet Explorer, please the visit following website: http://www.microsoft.com/ie/ DESCRIPTION Remote exploitation of a use-after-free vulnerability in...
- 05.23.13 BACKGROUND QuickTime is Apple's media player product used to render video and other media. For more information, visit http://www.apple.com/quicktime/ DESCRIPTION Remote exploitation of a memory corruption vulnerability in Apple Inc.'s QuickTime media player could allow attackers to execute arbitrary code in the context of the...
- 05.14.13 BACKGROUND Microsoft Windows is an operating system produced by Microsoft. More information can be found at the following vendor's website: http://windows.microsoft.com DESCRIPTION Local exploitation of a memory corruption vulnerability in Microsoft Corp.'s Windows win32k.sys kernel module driver could allow an attacker to execute...
- 05.14.13 BACKGROUND Internet Explorer (IE) is a graphical Web browser developed by Microsoft Corp. that has been included with Microsoft Windows since 1995. For more information about Internet Explorer, please the visit following website: http://www.microsoft.com/ie/ DESCRIPTION Remote exploitation of a use-after-free vulnerability in...
- 04.26.13 BACKGROUND HP Printers are common home and business printers. More information can be found at the vendor's website: http://welcome.hp.com/country/us/en/prodserv/printing_multifunction.html DESCRIPTION Remote exploitation of a directory traversal vulnerability in Hewlett-Packard Development Co. LP (HP)'s PostScript Interpreter, as...
- 03.14.13 BACKGROUND WebKit is an open-source Web browser engine. Currently, Apple Inc.'s Safari browser and Google Inc.'s Chrome browser use it. For more information, see the vendor's site at the following link: http://webkit.org/ DESCRIPTION Remote exploitation of a memory corruption vulnerability in WebKit, as included with multiple...
- 03.12.13 BACKGROUND Flash Player runs SWF files that can be created by the Adobe Flash authoring tool, by Adobe Flex, or by a number of other Macromedia and third-party tools. For more information, please visit the following website: http://www.adobe.com/products/flashplayer/ DESCRIPTION Remote exploitation of an integer buffer overflow...

Security

- draft-xu-spring-sfc-use-case-00 - Service Function Chaining Use Case[Docs] [txt|pdf] [Tracker] [Email] [Nits] Versions: 00 Network Working Group X. Xu Internet-Draft...
- OpenSSL, in spite of its name, isn't really a part of the OpenBSD project. But as one of the more positive results of the recent Heartbleed fiasco, the OpenBSD developers, who are known for their focus on readable and secure code, have now started a full-scale review and cleanup of the OpenSSL codebase.If you are interested in writing secure...
- A fake Android anti-virus application managed to fool many customers into buying it, even though it didn’t really have any anti-virus features. The $3.99 quickly rose through the ranks, reaching the top of the Google Play Store sales charts before Android Police discovered the truth behind it. The application was removed from the store once...
- Vulnerable: Sun JRE (Windows Production Release) 1.7.0_4Sun JRE (Windows Production Release) 1.7.0_2Sun JRE (Windows Production Release) 1.7Sun JRE (Solaris Production Release) 1.7.0_4Sun JRE (Solaris Production Release) 1.7.0_2Sun JRE (Solaris Production Release) 1.7Sun JRE (Linux Production Release) 1.7.0_4Sun JRE (Linux...
- By Sophie Knight TOKYO (Reuters) - In June 2011, when customers of now-bankrupt bitcoin exchange Mt. Gox agitated for proof that the Tokyo-based firm was still solvent after a hacking attack, CEO Mark Karpeles turned to the comedy science fiction novel "The Hitchhikers Guide to the Galaxy". During an online chat, Karpeles moved the equivalent of...