Gate Access Clarification
782nd MI Battalion Soldiers march to remember
Youngsters compete in Special Olympics
Christians celebrate Easter Sunrise message
CYSS promises summer camp will be u2018blazingu2019 good time
Toys, lively music lead to fun learning at KinderJam
Newsflash:
Cyber Center of Excellence Cyber Center of Excellence
The Cyber CoE is the Force Modernization Proponent (FMP) for cyberspace operations, signal/communications networks and information services,...
More detail
Fort Gordon Fort Gordon
FORT GORDON is a large, multi mission, multi-service military installation providing base services and support across a wide spectrum of training, operational...
More detail
Army Cyber Command Army Cyber Command
ARCYBER plans, coordinates, integrates,  synchronizes, directs, and conducts network operations and defense of all Army networks; ...
More detail

Cyber News

- Partnerships are vital to preempt adversaries and achieve global economic vitality and political stability. This courage to share will enable new...
- SDN is tailor-made for the consolidation, automation and security needs of the department, Juniper’s Brian Roach writes....
- Liberal doves need to find candidates who can bring Congress's foreign policy into line with the desires of the American people....
- The powerful House Oversight and Government Reform Committee has lost confidence in Drug Enforcement Administration chief Michele Leonhart, according...
- Three men face charges in a fraud scheme involving a helicopter fleet that transports the president and vice president, federal prosecutors said...
- The U.S. Defense Department now has taken steps to empower the chief information officer. It is a sign that the relative importance of computer-based...
- The longstanding DOD programming language goes from mainframes to mobile devices....
- The service is outlining a multidecade plan for autonomic and robotic systems....
- Federal employees would be wise to ponder before posting and to think through their tweeting in order to avoid running afoul of government ethics...

Technology & Security

- Weekend Project - I created a strong password generator : netsec...
- An Argument for Moving Your SSH Port off 22 : netsec...
- Events such as the massive attack on Sony Pictures have emphasised yet again how anyone with a grudge and a certain amount of technical knowledge can undermine the digital systems on which modern internet-connected economies rely. A timely paper, Attributing Cyber Attacks , published by Thomas Rid and Ben Buchanan of the Department of War Studies...
- Injecting invisible code into the hard drive controller, and other embedded systems : netsec...
- SEOUL, South Korea (AP) -- North Korea on Sunday criticized the United States for slapping sanctions on Pyongyang officials and organizations for a cyberattack on Sony Pictures — the latest fallout from a Hollywood movie depicting the fictional assassination of North Korean leader Kim Jong Un. An unnamed spokesman for North Korea's Foreign...
- An online group has released what it claims is the software development kit (SDK) for Microsoft's Xbox One console and according to reports may have access to games from Halo developers 343 Industries. The leakers released the kit over the festive break to encourage researchers to develop exploits required to gain full control of the consoles. The...
- It was either ignorance or disingenuousness. Or it could have just been a stupid mistake. In mid-December, Google Google chairman Eric Schmidt gave some unsound advice during an interview at the Cato Cato Institute in Washington D.C, upon being quizzed about the potential for his employer to pass on information to intelligence agencies. “If...
- Google has published details and a proof-of-concept (PoC) for a local privilege escalation vulnerability affecting Windows 8.1. The security hole was reported to Microsoft on September 30, 2014, by Google’s Project Zero initiative. According to Project Zero’s disclosure policy, the details of a bug automatically become visible to the public...
- Ryan Young The key to getting a wounded soldier from a battlefield to a hospital is stabilization—holding off the damage done by bullet or bomb for long enough to get to surgery. So faster evacuation is always better. Now the hospital can actually meet the injured partway—in the form of a Boeing C-17 Globemaster III,...
- Finnish bank OP is continuing to fight off a cascading series of distributed denial of service (DDoS) attacks that began on New Year's Eve....