Post honors WWII POWs
Local cook makes national TV appearance
DFMWR, ACS conduct internal exercise
Service members battle for title
Cyber Center of Excellence Cyber Center of Excellence
The Cyber CoE is the Force Modernization Proponent (FMP) for cyberspace operations, signal/communications networks and information services,...
More detail
Fort Gordon Fort Gordon
FORT GORDON is a large, multi mission, multi-service military installation providing base services and support accross a wide spectrum of training, ...
More detail
Army Cyber Command Army Cyber Command
ARCYBER plans, coordinates, integrates,  synchronizes, directs, and conducts network operations and defense of all Army networks; ...
More detail

Cyber News

- As Germany celebrated the 25th anniversary of the fall of the Berlin Wall on Sunday, Elke Rosin recalled how lucky her family had been....
- At Hanscom AFB, the service is centralizing control of the six cyber capabilities classified last year as weapons systems....
- It could be decades before we know the depth of veterans' health problems....
- Robert McDonald, the new secretary of the beleaguered Department of Veterans Affairs, promised to fix the scandal-tainted agency this year, vowing to...
- Iraqi officials said Sunday that an airstrike wounded the leader of the Islamic State group, Abu Bakr al-Baghdadi. Pentagon officials said they had...
- Teams at Fort Bliss complete the latest tests of WIN-T Increment 2, bringing real-time battlefield intelligence to the company level....
- The top Republican says limits on the bill could hurt soldiers....
- As they prepare to testify before Congress on Tuesday about what they are doing to ward off time and attendance fraud, officials at the U.S. Patent...

Technology & Security

- One of the discussions that comes up repeatedly in security circles is how to replace the venerable username/password method of providing access control. People are creatures of habit and more often than naught they will pick passwords that are easily remembered and just as easily guessed. So, how do we build a better mouse trap? There has to be a...
- Everyone knows diamonds are the hardest naturally formed substance on Earth. So what happens if you combine them with nanotech? You get stuff that could build a space elevator....
- Despite the outcry following Edward Snowden?s revelations about the NSA, it still goes unnoticed that we regularly submit ourselves to a far higher level of surveillance, without complaint...
- With a title as audacious as “The Meaning of Human Existence,” even a casual reader couldn’t be faulted for expecting a veritable Rosetta Stone to the cosmos and life as we know it. But in his latest book, Edward O. Wilson offers no philosophically-satisfying answers to this age-old “existence” question. And maybe that’s his point....
- I have been exposed to a large number of mobile devices over the last few years and think there’s a bit (pun intended) of a problem with Android that hasn’t been talked about much. In addition to reviewing a number of flagship devices from Samsung, HTC, Lenovo, Acer and NVIDIA, I have owned a number of other devices from manufactures like LG,...
- Consumer tests suggest Apple's iPhone 6 Plus isn't prone to bending, but don't yet prove it won't happen through normal use....
- Yesterday at the COSAC 21st International Computer Security Symposium and SABSA World Congress in Naas, Ireland, a researcher demonstrated a protocol he had devised that automates the transfer of data from any display to devices like smart phones....
- Should another world war occur, there will be two new domains of conflict in addition to air, naval and land forces: space and cyber warfare. The latter will be the first-ever, man-made domain of conflict, while the others are provided by nature. The highest aerial position is always a basis of competitive advantage in a conflict, be it for...
- Google has recently been making a huge marketing push for Google Now. I’ve seen TV ads appearing on primetime shows, banners and billboards across downtowns of major cities, and even taxicab advertisements in Times Square of New York City. One thing’s certain: Google is serious about its app. So, should business owners and marketers get...
- JPMorgan Chase Hackers Infiltrated Others, Report Says By Mathew J. Schwartz, October 6, 2014. Follow Mathew J. @euroinfosec   The hackers who successfully infiltrated the network of banking giant JPMorgan Chase have also breached the networks of approximately nine other financial institutions, none of which has been publicly named, according to...