Can US Cyber Command overcome its staffing shortage?

Can US Cyber Command overcome its staffing shortage?

The Department of Defense’s 10-year-old cyber war-fighting outfit is facing growing pains despite a concerted effort by the Pentagon to make cyber a higher priority. Sources speaking to Fifth Domain described a two-pronged problem with staffing shortfalls at U.S. Cyber Command’s headquarters, as well as the headquarters elements of the four service cyber components. These…

Breaking Full Disk Encryption from a Memory Dump

Breaking Full Disk Encryption from a Memory Dump

How does one go from being root on the host to gaining access to data in a Virtual Machine running with full disk encryption. This is the exact question that arose from an internal discussion we had at Appsecco to which we wanted answers. I came across many ways to the break full disk encryption,…

Reddit Breach Highlights Limits of SMS-Based 2FA Authentication

Reddit Breach Highlights Limits of SMS-Based 2FA Authentication

Reddit.com today disclosed that a data breach exposed some internal data, as well as email addresses and passwords for some Reddit users. As Web site breaches go, this one doesn’t seem too severe. What’s interesting about the incident is that it showcases once again why relying on mobile text messages (SMS) for two-factor authentication (2FA)…

BGP4: Iran Telecommunication Company AS58224 hijacked Telegram Messenger

BGP4: Iran Telecommunication Company AS58224 hijacked Telegram Messenger

https://bgpstream.com/event/144055   Iran Telecommunication Company AS58224 hijacked several more specific prefixes for Telegram Messenger @telegram: the fact that these more specific prefixes exist in their network indicates these are treated ‘special’ (i.e. deliberate):   https://bgpstream.com/ scroll down to 2018-07-30 @ 6:28   Replay: At 06:28:25 UTC Iran Telecommunication Company AS58224, hijacked several more specific prefixes…

SHRIMP: Insect-Size Microrobotics for Life-Saving Operations

SHRIMP: Insect-Size Microrobotics for Life-Saving Operations

SHRIMP program: short for SHort-Range Independent Microrobotic Platforms   This post is also available in: עברית (Hebrew) Microrobots have been studied by the U.S. military for years, but they tend to be simple machines with limited intelligence. Recently, however, the Defense Advanced Research Projects Agency (DARPA) launched a new initiative to improve microrobots. The SHRIMP…

Under the Hoodie 2018: Lessons from a Season of Penetration Testing

Under the Hoodie 2018: Lessons from a Season of Penetration Testing

Executive Summary This paper presents the results of 268 engagements (251 of which involved live, production network tests), conducted from early September of 2017 through mid-June of 2018. Fifty-nine percent of all penetration tests performed in the survey period were externally based, where the targets tend to be internet-facing vectors such as web applications, email…

‘The best piece of legislation’ in DC is about Quantum Computing

‘The best piece of legislation’ in DC is about Quantum Computing

Congressman Will Hurd warned that Russia and China are sucking up encrypted communications in the hopes of retroactively reading them after they achieve encryption-breaking quantum computing capabilities. (AP Photo/Pablo Martinez Monsivais)   A Texas congressman warned of the growing threat quantum computing presents if competitors such as Russia or China achieve the technological feat first.…

Most ICOs Retain Centralized Control, Break Whitepaper Promises, Academic Report Shows

Most ICOs Retain Centralized Control, Break Whitepaper Promises, Academic Report Shows

Initial Coin Offerings (ICO) “failed” to provide protection against insider trading or stick to their whitepaper promises, a new report from the University of Pennsylvania Law School released July 17 reveals. The lengthy study of the ICO phenomenon, dubbed “Coin-Operated Capitalism,” begins with a frank appraisal of investor expectations versus reality, the four contributing professors…

Blockchain Phones Calling the Future of Telecommunications

Blockchain Phones Calling the Future of Telecommunications

The emergence of blockchain technology has piqued the interest of a number of different sectors across global society. From finance, politics, economics, automotive and technology, blockchain is starting to take root. It is now being seen that communications could be the latest sector to benefit from this technological revolution. There has been a predictive report…

Google: 2FA/U2F Security Keys Neutered Employee Phishing

Google: 2FA/U2F Security Keys Neutered Employee Phishing

A YubiKey Security Key made by Yubico. The basic model featured here retails for $20 The basic idea behind two-factor authentication (2FA/U2F) is that even if thieves manage to phish or steal your password, they still cannot log in to your account unless they also hack or possess that second factor.   by Brian Krebs…

A “Cyber Axis of Evil” is Rewriting the Cyber Kill Chain

A “Cyber Axis of Evil” is Rewriting the Cyber Kill Chain

Survey of Incident Responders Shows That Businesses Needs to Re-architect Cybersecurity The cyber kill chain employed by advanced adversaries is changing. Defenders need to evolve their defensive strategies to meet the new challenge; and they need to develop silent hunting skills. A new study from Carbon Black queried 37 incident response firms that use its…

Canada: Russian-Backed Bitcoin Miner Hut 8 Becomes ‘Largest’ by Capacity After Second Site Opening

Canada: Russian-Backed Bitcoin Miner Hut 8 Becomes ‘Largest’ by Capacity After Second Site Opening

Toronto-based Bitcoin mining company Hut 8 has announced the completion of its second mining facility in Canada on July 16, claiming to have become the world’s “largest publicly-traded” operator by capacity. In a press release, Hut 8 revealed its Medicine Hat farm had been completed ahead of its September deadline, joining its existing operation in…

“SDI” #2? Quantum Entanglement: Sorting Hype from Reality in China’s Quantum-Tech Quest

“SDI” #2? Quantum Entanglement: Sorting Hype from Reality in China’s Quantum-Tech Quest

Could the “spooky action” of quantum technologies enable China to develop disruptive military capabilities – and perhaps achieve a strategic advantage? In its quest to offset U.S. techno-strategic advantages, China aspires to emerge as a “science and technology superpower” (科技强国) and leap ahead in quantum science through a new national megaproject. From the launch of the world’s…

The US Department of Defense plans to spend $1.7 billion for new Joint Artificial Intelligence Center

The US Department of Defense plans to spend $1.7 billion for new Joint Artificial Intelligence Center

Here’s how much a new artificial intelligence center could cost The Department of Defense plans to spend $1.7 billion over the next five years to stand up a new Joint Artificial Intelligence Center, according to new budgeting figures. The reprograming documents sent to Congress, obtained by C4ISRNET sister publication Defense News, outline the Pentagon plans…