Changes to bus service take place March 1
AER campaign kicks off
McKenna Gate signage reflects sacrifice
GRU hosts military appreciation game
Veterans Curation Program celebrates five years
Newsflash:
Cyber Center of Excellence Cyber Center of Excellence
The Cyber CoE is the Force Modernization Proponent (FMP) for cyberspace operations, signal/communications networks and information services,...
More detail
Fort Gordon Fort Gordon
FORT GORDON is a large, multi mission, multi-service military installation providing base services and support across a wide spectrum of training, operational...
More detail
Army Cyber Command Army Cyber Command
ARCYBER plans, coordinates, integrates,  synchronizes, directs, and conducts network operations and defense of all Army networks; ...
More detail

Cyber News

- For a force that has built its reputation on an aura of momentum and invincibility, the Islamic State group is now dealing with a series of military...
- The San Diego-based center is working with Arizona State's Furnace program on the military’s latest tech transfer initiative....
- The charges against the Army sergeant are expected to come Thursday afternoon....
- Special treatment from federal, state and local governments has given the U.S. Postal Service an unfair advantage over private-sector competitors...
- Recruiting for a qualified military and civilian workforce for the U.S. Defense Department's cybersecurity mission has proven successful so far,...
- Cybersecurity is one of the critical homeland security priorities, along with the threats posed in the varying domains of aviation, border security...
- The Army has dropped the term 'Negro' from a policy document that called the word an acceptable alternative to 'Black' or 'African American.'...
- The lightweight, modular Common Infrared Countermeasure system can help protect helicopter and small aircraft from ground-launched missiles....
- Next time you travel, be careful not to complain about airport security....
- A top Democrat this week will ask President Obama to fire the Commerce Department’s inspector general after a congressional probe uncovered a...

Technology & Security

- Weekend Project - I created a strong password generator : netsec...
- An Argument for Moving Your SSH Port off 22 : netsec...
- Events such as the massive attack on Sony Pictures have emphasised yet again how anyone with a grudge and a certain amount of technical knowledge can undermine the digital systems on which modern internet-connected economies rely. A timely paper, Attributing Cyber Attacks , published by Thomas Rid and Ben Buchanan of the Department of War Studies...
- Injecting invisible code into the hard drive controller, and other embedded systems : netsec...
- SEOUL, South Korea (AP) -- North Korea on Sunday criticized the United States for slapping sanctions on Pyongyang officials and organizations for a cyberattack on Sony Pictures — the latest fallout from a Hollywood movie depicting the fictional assassination of North Korean leader Kim Jong Un. An unnamed spokesman for North Korea's Foreign...
- An online group has released what it claims is the software development kit (SDK) for Microsoft's Xbox One console and according to reports may have access to games from Halo developers 343 Industries. The leakers released the kit over the festive break to encourage researchers to develop exploits required to gain full control of the consoles. The...
- It was either ignorance or disingenuousness. Or it could have just been a stupid mistake. In mid-December, Google Google chairman Eric Schmidt gave some unsound advice during an interview at the Cato Cato Institute in Washington D.C, upon being quizzed about the potential for his employer to pass on information to intelligence agencies. “If...
- Google has published details and a proof-of-concept (PoC) for a local privilege escalation vulnerability affecting Windows 8.1. The security hole was reported to Microsoft on September 30, 2014, by Google’s Project Zero initiative. According to Project Zero’s disclosure policy, the details of a bug automatically become visible to the public...
- Ryan Young The key to getting a wounded soldier from a battlefield to a hospital is stabilization—holding off the damage done by bullet or bomb for long enough to get to surgery. So faster evacuation is always better. Now the hospital can actually meet the injured partway—in the form of a Boeing C-17 Globemaster III,...
- Finnish bank OP is continuing to fight off a cascading series of distributed denial of service (DDoS) attacks that began on New Year's Eve....