Signal Towers unveils electronic control facility access
Mr. Nelson Keeler visitu2019s TWI students accompanied by Mr. Quinzel Chestnut
RNCOA holds change of command
Library undergoes construction to accommodate disability compliance
Get Outdoors Gordon takes divers to great depths
Women’s Equality Day
CAC ACCESS ONLY. SigKN - The Cyber/Signal FOUO Portal
Cyber Center of Excellence Cyber Center of Excellence
The Cyber COE is the Force Modernization Proponent (FMP) for cyberspace operations, signal/communications networks and information services,...
More detail
Ft. Gordon Ft. Gordon
FORT GORDON is a large, multi mission, multi-service military installation providing base services and support accross a wide spectrum of training, ...
More detail
Army Cyber Command Army Cyber Command
ARCYBER plans, coordinates, integrates,  synchronizes, directs, and conducts network operations and defense of all Army networks; ...
More detail

Cyber News

- [AUG 21, 2014 - Baltimore Sun] The Maryland Technology Development Corp. has established a $1 million fund to invest in startups launching new cyber security technologies, officials announced...
- [AUG 21, 2014 - Huntsville Times] Middle schoolers in Madison City Schools are being introduced to the world of cybersecurity with the help of a local non-profit organization....
- [AUG 20, 2014 - Deutsche Welle] Whistleblower William Binney recently made headlines when he told the German parliament that the NSA, his former employer, had become "totalitarian." DW spoke to him...
- [AUG 20, 2014 - Deutsche Welle] Whistleblower William Binney recently made headlines when he told the German parliament that the NSA, his former employer, had become "totalitarian." DW spoke to him...
- [AUG 20, 2014 - Stanford News] Congressional staffers studying cybersecurity issues at a Stanford workshop are learning just how insecure the Internet can be....
- [AUG 20, 2014 - FedScoop] Wondering what it’s like to work at the National Security Agency, one of the most secretive intelligence agencies in the world, is nothing new for most people....
- [AUG 20, 2014 - KBTX-TV] In the wake of Monday's news of the latest cyber breach of information -- College Station Medical Center's parent company having some customer info stolen -- we wanted to...
- [AUG 19, 2014 - Healthcare Dive] Franklin, TN-based Community Health Systems announced Monday that it was the victim of a massive theft of the personal data of 4.5 million people....
- [AUG 19, 2014 - LA Times] A little more than a year after former National Security Agency contractor Edward Snowden revealed that the federal government was collecting and storing the telephone...
- [AUG 19, 2014 - Washington Post] Seven-year old Audrey Jones's tight curls bounce wildly as she bangs screwdrivers on a bit of hardware....

Vulnerabilities

- 09.10.13 BACKGROUND Adobe Shockwave Player is a popular Web browser plug-in. It is available for multiple Web browsers and platforms, including Windows, and MacOS. Shockwave Player enables Web browsers to display rich multimedia content in the ...
- 09.10.13 BACKGROUND Microsoft Windows is an operating system produced by Microsoft. More information can be found at the following vendor's website: http://windows.microsoft.com DESCRIPTION Remote exploitation of a design error in Microsoft Corp.'s Windows handling of theme files could allow an attacker to execute arbitrary code with...
- 07.16.13 BACKGROUND Oracle's JRE is a platform that supports the execution of programs developed using the Java programming language. It is available for multiple platforms, including Windows, Linux and Mac OS. The JRE platform also supports Java Applets, which can be loaded from Web pages. For more information, please visit the vendor's...
- 07.09.13 BACKGROUND Internet Explorer (IE) is a graphical Web browser developed by Microsoft Corp. that has been included with Microsoft Windows since 1995. For more information about Internet Explorer, please the visit following website: http://www.microsoft.com/ie/ DESCRIPTION Remote exploitation of a use-after-free vulnerability in...
- 05.23.13 BACKGROUND QuickTime is Apple's media player product used to render video and other media. For more information, visit http://www.apple.com/quicktime/ DESCRIPTION Remote exploitation of a memory corruption vulnerability in Apple Inc.'s QuickTime media player could allow attackers to execute arbitrary code in the context of the...
- 05.14.13 BACKGROUND Microsoft Windows is an operating system produced by Microsoft. More information can be found at the following vendor's website: http://windows.microsoft.com DESCRIPTION Local exploitation of a memory corruption vulnerability in Microsoft Corp.'s Windows win32k.sys kernel module driver could allow an attacker to execute...
- 05.14.13 BACKGROUND Internet Explorer (IE) is a graphical Web browser developed by Microsoft Corp. that has been included with Microsoft Windows since 1995. For more information about Internet Explorer, please the visit following website: http://www.microsoft.com/ie/ DESCRIPTION Remote exploitation of a use-after-free vulnerability in...
- 04.26.13 BACKGROUND HP Printers are common home and business printers. More information can be found at the vendor's website: http://welcome.hp.com/country/us/en/prodserv/printing_multifunction.html DESCRIPTION Remote exploitation of a directory traversal vulnerability in Hewlett-Packard Development Co. LP (HP)'s PostScript Interpreter, as...
- 03.14.13 BACKGROUND WebKit is an open-source Web browser engine. Currently, Apple Inc.'s Safari browser and Google Inc.'s Chrome browser use it. For more information, see the vendor's site at the following link: http://webkit.org/ DESCRIPTION Remote exploitation of a memory corruption vulnerability in WebKit, as included with multiple...
- 03.12.13 BACKGROUND Flash Player runs SWF files that can be created by the Adobe Flash authoring tool, by Adobe Flex, or by a number of other Macromedia and third-party tools. For more information, please visit the following website: http://www.adobe.com/products/flashplayer/ DESCRIPTION Remote exploitation of an integer buffer overflow...

Security

- Andrew Baker20 hours ago | Comments (0)By now, you know that Update 1 for Windows 8.1 is right around the corner.  But do you have any idea just how critical it will be for you to have it? Update 1 will be released in less than a week, and when it comes, it will be necessary to have it installed if you are looking for patches in May 2014 and...
- draft-boucadair-sfc-requirements-04 - Requirements for Service Function Chaining (SFC)[Docs] [txt|pdf|xml|html] [Tracker] [Email] [Diff1] [Diff2] [Nits] Versions: (draft-boucadair-chaining-requirements) 0001020304 SFC...
- Daily Network Security Podcast Details - Internet Security | SANS ISCFG_AUTHORS: via SANS Institute...
- JERUSALEM (Reuters) - Israel will temporarily suspend some of its government websites' international traffic to fend off a potential mass-cyber attack by pro-Palestinian hackers, an Israeli security source said on Thursday, without elaborating on the threat. The precautionary measure would be in place from Friday through Monday, the source said,...
- Computerworld - Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe. That's where...
- There seem to be as many definitions of APT as there are actual APTs. So what is an advanced persistent threat, really?FG_AUTHORS: via SANS Institute...
- Hacking is no longer just a game for tech-savvy teens looking for bragging rights. It is a for-profit business -- a very big business. Yes, it is employed for corporate and political espionage, activism ("hacktivism") or even acts of cyberwar, but the majority of those in it, are in it for the money."So, security experts say, one good way for...
- Making Wardriving Mobile (with Python and a RPi) x-post r/raspberry_pi : netsecthis post was submitted on 03 Apr 20140points (50% like it)3upvotes3downvotesshortlink: π Rendered by PID 28444 on app-137 at 2014-04-03 14:58:11.183599+00:00 running 3c62e41.FG_AUTHORS: via SANS Institute...
- The Mobility News Weekly is an online newsletter made up of the most interesting news and articles related to enterprise mobility that I run across each week.  I am specifically targeting information that reflects market data and trends.Also read Enterprise Mobility Asia News WeeklyAlso read Field Mobility News WeeklyAlso read M2M News...