IT'S OFFICIAL! Fort Gordon is home to the U.S. Army Cyber Center of Excellence!
Cyber Center of Excellence among new additions to post community
Awareness, education keep SAAM at forefront
CAC ACCESS ONLY. SigKN - The Cyber/Signal FOUO Portal
Cyber Center of Excellence Cyber Center of Excellence
The Cyber COE is the Force Modernization Proponent (FMP) for cyberspace operations, signal/communications networks and information services,...
More detail
Ft. Gordon Ft. Gordon
FORT GORDON is a large, multi mission, multi-service military installation providing base services and support accross a wide spectrum of training, ...
More detail
Army Cyber Command Army Cyber Command
ARCYBER plans, coordinates, integrates,  synchronizes, directs, and conducts network operations and defense of all Army networks; ...
More detail

Cyber News

- [JUL 9, 2014 - Raw Story] North Korea has doubled the number of its elite cyber warriors over the past two years and established overseas bases for hacking attacks, a report said Sunday....
- [JUL 9, 2014 - Raw Story] North Korea has doubled the number of its elite cyber warriors over the past two years and established overseas bases for hacking attacks, a report said Sunday....
- [JUL 10, 2014 - ARmy Times] Ground commanders are already learning how to counter cyber threats in the field, but the Army's cyber boss wants them to start launching their own attacks....
- [JUL 10, 2014 - ARmy Times] Ground commanders are already learning how to counter cyber threats in the field, but the Army's cyber boss wants them to start launching their own attacks....
- [JUL 10, 2014 - NY Times] A new report based on documents provided by Edward J. Snowden has identified five American Muslims, including the leader of a civil rights group, as having been subjected...
- [JUL 10, 2014 - Time] I am saddened, but not surprised, by recent revelations that I am on the list of Muslim-American leaders who have been targets for NSA surveillance....
- [JUL 10, 2014 - The Guardian] The White House has instructed US security agencies to review their training and policy materials for racial or religious bias after documents leaked by Edward Snowden...
- [JUL 11, 2014 - The Guardian] General Keith Alexander, the then director of the NSA, was briefed that the Guardian was prepared to make a largely symbolic act of destroying documents from Edward...
- [JUL 11, 2014 - Time] Whether it’s a legal scholar or a 7-year-old child that’s bullied on the playground, it’s hard to argue with this Harvard Law Review definition of privacy from 1890:...
- [JUL 11, 2014 - Politico] China’s alleged efforts to hack into a trove of personal information about U.S. federal government employees seeking security clearances shows a brazen disregard for...

Vulnerabilities

- 09.10.13 BACKGROUND Adobe Shockwave Player is a popular Web browser plug-in. It is available for multiple Web browsers and platforms, including Windows, and MacOS. Shockwave Player enables Web browsers to display rich multimedia content in the ...
- 09.10.13 BACKGROUND Microsoft Windows is an operating system produced by Microsoft. More information can be found at the following vendor's website: http://windows.microsoft.com DESCRIPTION Remote exploitation of a design error in Microsoft Corp.'s Windows handling of theme files could allow an attacker to execute arbitrary code with...
- 07.16.13 BACKGROUND Oracle's JRE is a platform that supports the execution of programs developed using the Java programming language. It is available for multiple platforms, including Windows, Linux and Mac OS. The JRE platform also supports Java Applets, which can be loaded from Web pages. For more information, please visit the vendor's...
- 07.09.13 BACKGROUND Internet Explorer (IE) is a graphical Web browser developed by Microsoft Corp. that has been included with Microsoft Windows since 1995. For more information about Internet Explorer, please the visit following website: http://www.microsoft.com/ie/ DESCRIPTION Remote exploitation of a use-after-free vulnerability in...
- 05.23.13 BACKGROUND QuickTime is Apple's media player product used to render video and other media. For more information, visit http://www.apple.com/quicktime/ DESCRIPTION Remote exploitation of a memory corruption vulnerability in Apple Inc.'s QuickTime media player could allow attackers to execute arbitrary code in the context of the...
- 05.14.13 BACKGROUND Microsoft Windows is an operating system produced by Microsoft. More information can be found at the following vendor's website: http://windows.microsoft.com DESCRIPTION Local exploitation of a memory corruption vulnerability in Microsoft Corp.'s Windows win32k.sys kernel module driver could allow an attacker to execute...
- 05.14.13 BACKGROUND Internet Explorer (IE) is a graphical Web browser developed by Microsoft Corp. that has been included with Microsoft Windows since 1995. For more information about Internet Explorer, please the visit following website: http://www.microsoft.com/ie/ DESCRIPTION Remote exploitation of a use-after-free vulnerability in...
- 04.26.13 BACKGROUND HP Printers are common home and business printers. More information can be found at the vendor's website: http://welcome.hp.com/country/us/en/prodserv/printing_multifunction.html DESCRIPTION Remote exploitation of a directory traversal vulnerability in Hewlett-Packard Development Co. LP (HP)'s PostScript Interpreter, as...
- 03.14.13 BACKGROUND WebKit is an open-source Web browser engine. Currently, Apple Inc.'s Safari browser and Google Inc.'s Chrome browser use it. For more information, see the vendor's site at the following link: http://webkit.org/ DESCRIPTION Remote exploitation of a memory corruption vulnerability in WebKit, as included with multiple...
- 03.12.13 BACKGROUND Flash Player runs SWF files that can be created by the Adobe Flash authoring tool, by Adobe Flex, or by a number of other Macromedia and third-party tools. For more information, please visit the following website: http://www.adobe.com/products/flashplayer/ DESCRIPTION Remote exploitation of an integer buffer overflow...

Security

- Andrew Baker20 hours ago | Comments (0)By now, you know that Update 1 for Windows 8.1 is right around the corner.  But do you have any idea just how critical it will be for you to have it? Update 1 will be released in less than a week, and when it comes, it will be necessary to have it installed if you are looking for patches in May 2014 and...
- draft-boucadair-sfc-requirements-04 - Requirements for Service Function Chaining (SFC)[Docs] [txt|pdf|xml|html] [Tracker] [Email] [Diff1] [Diff2] [Nits] Versions: (draft-boucadair-chaining-requirements) 0001020304 SFC...
- Daily Network Security Podcast Details - Internet Security | SANS ISCFG_AUTHORS: via SANS Institute...
- JERUSALEM (Reuters) - Israel will temporarily suspend some of its government websites' international traffic to fend off a potential mass-cyber attack by pro-Palestinian hackers, an Israeli security source said on Thursday, without elaborating on the threat. The precautionary measure would be in place from Friday through Monday, the source said,...
- Computerworld - Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe. That's where...
- There seem to be as many definitions of APT as there are actual APTs. So what is an advanced persistent threat, really?FG_AUTHORS: via SANS Institute...
- Hacking is no longer just a game for tech-savvy teens looking for bragging rights. It is a for-profit business -- a very big business. Yes, it is employed for corporate and political espionage, activism ("hacktivism") or even acts of cyberwar, but the majority of those in it, are in it for the money."So, security experts say, one good way for...
- Making Wardriving Mobile (with Python and a RPi) x-post r/raspberry_pi : netsecthis post was submitted on 03 Apr 20140points (50% like it)3upvotes3downvotesshortlink: π Rendered by PID 28444 on app-137 at 2014-04-03 14:58:11.183599+00:00 running 3c62e41.FG_AUTHORS: via SANS Institute...
- The Mobility News Weekly is an online newsletter made up of the most interesting news and articles related to enterprise mobility that I run across each week.  I am specifically targeting information that reflects market data and trends.Also read Enterprise Mobility Asia News WeeklyAlso read Field Mobility News WeeklyAlso read M2M News...