Cyber Doctrine and Lessons and Best Practices Booth at AFCEA - Augusta TechNet
Fogarty becomes commander of Cyber CoE
Home is where the heart is, and where your vote can be.
Cyber Protection Brigade to conduct defense operations
Installation observes Suicide Prevention week, month
CAC ACCESS ONLY. SigKN - The Cyber/Signal FOUO Portal
Cyber Center of Excellence Cyber Center of Excellence
The Cyber COE is the Force Modernization Proponent (FMP) for cyberspace operations, signal/communications networks and information services,...
More detail
Ft. Gordon Ft. Gordon
FORT GORDON is a large, multi mission, multi-service military installation providing base services and support accross a wide spectrum of training, ...
More detail
Army Cyber Command Army Cyber Command
ARCYBER plans, coordinates, integrates,  synchronizes, directs, and conducts network operations and defense of all Army networks; ...
More detail

Cyber News

- One senator is on a quest to help soldiers find their vehicles, which are being held up as they move overseas....
- Senators largely backed training opposition forces, but they also floated embedding U.S. soldiers with the Iraqi military....
- Russia has shut down several of the fast-food chain's restaurants, bringing the yellow arches into the sanctions war....
- On foreign policy and immigration, the president has prioritized short-term politics over sound policy. And it's costing him badly in his final years...
- During his final year in Congress in 2008, then-Sen....
- Twenty contractor teams will compete in a program to detect and identify explosives planted in culverts....
- Federal civilian and military personnel will be able to direct donations to a wider range of charities through the Combined Federal Campaign now...
- [SEP 11, 2014 - Forbes] Before Edward Snowden smashed its digital doors wide open, the National Security Agency was seen as the mysterious keeper of...
- The goal is to build vehicles that don't just withstand assaults but also predict and avoid them....

Technology

- In the ruthlessly competitive world of technology, where companies rush the latest gadget to market and slash prices to stay competitive, the TI-84 Plus is an anomaly. Texas Instruments released the graphing calculator in 2004, and continues to sell it today. The base model still has 480 kilobytes of ROM and 24 kilobytes of RAM. Its...
- Math – the m in STEM – is probably the least glamorous of all the STEM fields. Go ahead – just try to name one celebrity mathematician (Russell Crowe as Princeton math legend John Nash in A Beautiful Mind doesn’t count). But all that could be changing. The big news, of course, is that the […]...
- Car2go’s parent company announced Wednesday that it is acquiring two transportation apps, Austin-based RideScout and Hamburg-based mytaxi. The services bolster efforts by Moovel, formerly known as Daimler Mobility Services, to leverage smartphones for transportation needs. “We really want to give our members more choices and many choices for...
- As the Internet and the disruptive innovations it spawns are becoming economically, politically, and culturally vital for the world’s three billion users (and counting), there’s been a worrisome though unsurprising outburst of initiatives across governments to figure out ways to control it, suppress it, or otherwise extract value from it. This...
- There’s a renewed fervor among education advocates to encourage more students to enter the fields of science, technology, engineering, and mathematics (STEM). Entire economies depend largely on industries that increasingly are in dire need of talent in these very areas. One major hurdle is that many youngsters also tend to see these fields...
- Ever since President Obama announced the “Educate to Innovate” campaign for Excellence in Science, Technology, Engineering & Math (STEM) Education in November 2009, U.S. educators have launched a number of initiatives to push down STEM education to an earlier and earlier age. Entirely new curricula have been formed, new school...
- We’ve all heard it before, we are facing another crisis. This time it’s one of mammoth proportions, and not the wooly kind. Public education isn’t making the cut as high-tech jobs across the nation go unfilled. What’s a country to do? Knowing this challenge will only compound with time, policy leaders have acted.  To compete in...
- With nearly 16 million programmers in the world, at 10 to 15 percent women, there are more than two million female programmers — but we never see them. Technical women remain largely invisible and behind the scenes despite important and often elite contributions. In tech, we are standing on the shoulders of giants — men and women...
- Covering innovations does funny things to a guy’s smartphone. The average person, being reasonable and normal, has 26 apps on his or her phone. You really don’t need a ton of apps to have a functioning, thriving life. But me? I have 189. Most I’ve only used a few times. Trying to find the next cool, […]...
- From all the rumors and leaks, it now appears that Apple is going to unveil the mythical iWatch at its much-hyped product launch event on Sept. 9. While nothing has been definitely confirmed (and a lot of the iWatch rumors from Chinese tech blogs seem positively sketchy) — it’s possible that the new iWatch is […]...

Security News

- BACKGROUND Microsoft Excel is the spreadsheet application within Microsoft Office. DESCRIPTION Remote exploitation of a heap overflow vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability is a signed comparison error that leads to a heap...
- BACKGROUND Microsoft Windows is an operating system produced by Microsoft. More information can be found at the following vendor's website: http://windows.microsoft.com DESCRIPTION Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Windows DirectPlay could allow an attacker to execute arbitrary code with the...
- BACKGROUND Adobe Reader and Acrobat are portable document format (PDF) readers and processors. For more information, please visit the following pages: http://www.adobe.com/products/reader/http://www.adobe.com/products/acrobat/ DESCRIPTION Remote exploitation of a heap buffer overflow vulnerability in Adobe Systems Inc.'s Acrobat and Reader...
- BACKGROUND Adobe Reader and Acrobat are portable document format (PDF) readers and processors. For more information, please visit the following pages: http://www.adobe.com/products/reader/http://www.adobe.com/products/acrobat/ DESCRIPTION Remote exploitation of a heap overflow vulnerability in Adobe Systems Inc.'s Acrobat and Reader could...
- 01.08.13 BACKGROUND Adobe Reader is a portable document format (PDF) reader. For more information, please visit the following page: http://www.adobe.com/products/reader/ DESCRIPTION Remote exploitation of an integer overflow vulnerability in Adobe Systems Inc.'s Adobe Reader versions 10.1.4 and earlier could allow an attacker to execute...
- ...Read more http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1018
- 02.01.13 BACKGROUND Oracle's JavaFX is a software platform for creating cross-platform rich Internet applications (RIAs) was developed using the Java programming language or JavaFX script. It is bundled with Java Runtime Environment (JRE) and Java Development Kit since Java SE 7 Update 2. For Java SE 6, it is available to be downloaded...
- 02.01.13 BACKGROUND Oracle's JavaFX is a software platform for creating cross-platform rich Internet applications (RIAs) was developed using the Java programming language or JavaFX script. It is bundled with Java Runtime Environment (JRE) and Java Development Kit since Java SE 7 Update 2. For Java SE 6, it is available to be downloaded...
- BACKGROUND Oracle's JavaFX is a software platform for creating cross-platform rich Internet applications (RIAs) was developed using the Java programming language or JavaFX script. It is bundled with Java Runtime Environment (JRE) and Java Development Kit since Java SE 7 Update 2. For Java SE 6, it is available to be downloaded separately...
- BACKGROUND Adobe Flash Player runs SWF files that can be created by the Adobe Flash authoring tool, by Adobe Flex, or by a number of other Macromedia and third-party tools. For more information, please visit the following website: http://www.adobe.com/products/flashplayer/ DESCRIPTION Remote exploitation of a heap buffer overflow...