<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news June 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 07 Apr 2026 21:53:31 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-5/#comment-1684114</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 15:48:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684114</guid>
		<description><![CDATA[US Air Force delays timeline for testing a laser on a fighter jet
https://www.defensenews.com/air/2020/06/30/us-air-force-delays-timeline-for-testing-a-laser-on-a-fighter-jet/

WASHINGTON — The U.S. Air Force’s long-planned test of an airborne laser weapon aboard a fighter jet has been delayed until 2023 due to technical challenges and complications spurred by the ongoing coronavirus pandemic, its program head said.

The Air Force’s Self-Protect High Energy Laser Demonstrator program, or SHiELD, had originally planned to conduct its first flight demonstration in 2021, but the test has been pushed two years back, said Jeff Heggemeier, SHiELD program manager for the Air Force Research Laboratory.]]></description>
		<content:encoded><![CDATA[<p>US Air Force delays timeline for testing a laser on a fighter jet<br />
<a href="https://www.defensenews.com/air/2020/06/30/us-air-force-delays-timeline-for-testing-a-laser-on-a-fighter-jet/" rel="nofollow">https://www.defensenews.com/air/2020/06/30/us-air-force-delays-timeline-for-testing-a-laser-on-a-fighter-jet/</a></p>
<p>WASHINGTON — The U.S. Air Force’s long-planned test of an airborne laser weapon aboard a fighter jet has been delayed until 2023 due to technical challenges and complications spurred by the ongoing coronavirus pandemic, its program head said.</p>
<p>The Air Force’s Self-Protect High Energy Laser Demonstrator program, or SHiELD, had originally planned to conduct its first flight demonstration in 2021, but the test has been pushed two years back, said Jeff Heggemeier, SHiELD program manager for the Air Force Research Laboratory.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-5/#comment-1684113</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 15:47:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684113</guid>
		<description><![CDATA[China&#039;s Huawei and ZTE officially designated &#039;national security threats&#039; by the FCC
https://www.google.com/amp/s/www.cnbc.com/amp/2020/07/01/fcc-huawei-zte-officially-designated-national-security-threats.html]]></description>
		<content:encoded><![CDATA[<p>China&#8217;s Huawei and ZTE officially designated &#8216;national security threats&#8217; by the FCC<br />
<a href="https://www.google.com/amp/s/www.cnbc.com/amp/2020/07/01/fcc-huawei-zte-officially-designated-national-security-threats.html" rel="nofollow">https://www.google.com/amp/s/www.cnbc.com/amp/2020/07/01/fcc-huawei-zte-officially-designated-national-security-threats.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-5/#comment-1684110</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 15:32:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684110</guid>
		<description><![CDATA[Senate Armed Services Committee wants to prevent #DISA from spending money to deploy a network security program on #DoD&#039;s secret network

The Senate has questions about DISA’s network security system
https://www.c4isrnet.com/cyber/2020/06/29/the-senate-has-questions-about-disas-network-security-system/

A Senate committee’s version of the annual defense policy bill would ban the Department of Defense from spending money to deploy a controversial cybersecurity program on its secret network.]]></description>
		<content:encoded><![CDATA[<p>Senate Armed Services Committee wants to prevent #DISA from spending money to deploy a network security program on #DoD&#8217;s secret network</p>
<p>The Senate has questions about DISA’s network security system<br />
<a href="https://www.c4isrnet.com/cyber/2020/06/29/the-senate-has-questions-about-disas-network-security-system/" rel="nofollow">https://www.c4isrnet.com/cyber/2020/06/29/the-senate-has-questions-about-disas-network-security-system/</a></p>
<p>A Senate committee’s version of the annual defense policy bill would ban the Department of Defense from spending money to deploy a controversial cybersecurity program on its secret network.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-5/#comment-1684088</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 12:58:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684088</guid>
		<description><![CDATA[Dan Goodin / Ars Technica: 	
US Cybercom warns foreign state-backed hackers will likely abuse a recently discovered SAML vulnerability that allows unauthorized network admin logins  —  The window of opportunity to fix critical security bug is rapidly closing.  —  Foreign hackers backed by a well-resourced government … 
https://arstechnica.com/information-technology/2020/06/foreign-adversaries-likely-to-exploit-critical-networking-bug-us-gov-says/]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
US Cybercom warns foreign state-backed hackers will likely abuse a recently discovered SAML vulnerability that allows unauthorized network admin logins  —  The window of opportunity to fix critical security bug is rapidly closing.  —  Foreign hackers backed by a well-resourced government …<br />
<a href="https://arstechnica.com/information-technology/2020/06/foreign-adversaries-likely-to-exploit-critical-networking-bug-us-gov-says/" rel="nofollow">https://arstechnica.com/information-technology/2020/06/foreign-adversaries-likely-to-exploit-critical-networking-bug-us-gov-says/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-4/#comment-1684072</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 10:05:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684072</guid>
		<description><![CDATA[Apple: We&#039;re defending your privacy by nixing 16 browser APIs. Rivals:
You mean defending your bottom line
https://www.theregister.com/2020/06/29/apple_web_developers/
iGiant accused of holding back web progress to protect its 30% app cut]]></description>
		<content:encoded><![CDATA[<p>Apple: We&#8217;re defending your privacy by nixing 16 browser APIs. Rivals:<br />
You mean defending your bottom line<br />
<a href="https://www.theregister.com/2020/06/29/apple_web_developers/" rel="nofollow">https://www.theregister.com/2020/06/29/apple_web_developers/</a><br />
iGiant accused of holding back web progress to protect its 30% app cut</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-4/#comment-1684071</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 10:04:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684071</guid>
		<description><![CDATA[Google removes 25 Android apps caught stealing Facebook credentials
The malicious apps were downloaded more than 2.34 million times.
https://www.zdnet.com/article/google-removes-25-android-apps-caught-stealing-facebook-credentials/

According to a report from French cyber-security firm Evina shared with ZDNet today, the apps posed as step counters, image editors, video editors, wallpaper apps, flashlight applications, file managers, and mobile games.

The apps offered a legitimate functionality, but they also contained malicious code.]]></description>
		<content:encoded><![CDATA[<p>Google removes 25 Android apps caught stealing Facebook credentials<br />
The malicious apps were downloaded more than 2.34 million times.<br />
<a href="https://www.zdnet.com/article/google-removes-25-android-apps-caught-stealing-facebook-credentials/" rel="nofollow">https://www.zdnet.com/article/google-removes-25-android-apps-caught-stealing-facebook-credentials/</a></p>
<p>According to a report from French cyber-security firm Evina shared with ZDNet today, the apps posed as step counters, image editors, video editors, wallpaper apps, flashlight applications, file managers, and mobile games.</p>
<p>The apps offered a legitimate functionality, but they also contained malicious code.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-4/#comment-1684064</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 09:08:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684064</guid>
		<description><![CDATA[AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals
https://threatpost.com/aws-facial-recognition-platform-misidentified-over-100-politicians-as-criminals/156984/]]></description>
		<content:encoded><![CDATA[<p>AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals<br />
<a href="https://threatpost.com/aws-facial-recognition-platform-misidentified-over-100-politicians-as-criminals/156984/" rel="nofollow">https://threatpost.com/aws-facial-recognition-platform-misidentified-over-100-politicians-as-criminals/156984/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-4/#comment-1684056</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 07:46:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684056</guid>
		<description><![CDATA[DDoS and dingoes: Australia to bolster cyber-defences with 500 hackers
amid China spat
https://www.theregister.com/2020/06/30/australia_cyber_defence_fund/
Australia will hire 500 hackers as part of a AU$1.35bn (£754m, $925m)
boost to protect the nation&#039;s networks from a wave of cyber attacks.]]></description>
		<content:encoded><![CDATA[<p>DDoS and dingoes: Australia to bolster cyber-defences with 500 hackers<br />
amid China spat<br />
<a href="https://www.theregister.com/2020/06/30/australia_cyber_defence_fund/" rel="nofollow">https://www.theregister.com/2020/06/30/australia_cyber_defence_fund/</a><br />
Australia will hire 500 hackers as part of a AU$1.35bn (£754m, $925m)<br />
boost to protect the nation&#8217;s networks from a wave of cyber attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-4/#comment-1684055</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 07:46:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684055</guid>
		<description><![CDATA[Stinker, emailer, trawler, spy: How an engineer stole top US chip
designs, smuggled them to China to set up a rival fab
https://www.theregister.com/2020/06/30/avago_spying_guilty/
Chinese chap swiped communications blueprints from
what-is-now-Broadcom on behalf of Beijing. An engineer-turned-spy
stole confidential blueprints of American wireless electronics on
behalf of the Chinese government to run a rival factory churning out
the components in the Middle Kingdom.]]></description>
		<content:encoded><![CDATA[<p>Stinker, emailer, trawler, spy: How an engineer stole top US chip<br />
designs, smuggled them to China to set up a rival fab<br />
<a href="https://www.theregister.com/2020/06/30/avago_spying_guilty/" rel="nofollow">https://www.theregister.com/2020/06/30/avago_spying_guilty/</a><br />
Chinese chap swiped communications blueprints from<br />
what-is-now-Broadcom on behalf of Beijing. An engineer-turned-spy<br />
stole confidential blueprints of American wireless electronics on<br />
behalf of the Chinese government to run a rival factory churning out<br />
the components in the Middle Kingdom.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/06/01/cyber-security-news-june-2020/comment-page-4/#comment-1684054</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 07:45:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186352#comment-1684054</guid>
		<description><![CDATA[COVID-19 Breach Bubble&#039; Waiting to Pop?
https://krebsonsecurity.com/2020/06/covid-19-breach-bubble-waiting-to-pop/
The COVID-19 pandemic has made it harder for banks to trace the source
of payment card data stolen from smaller, hacked online merchants. On
the plus side, months of quarantine have massively decreased demand
for account information that thieves buy and use to create physical
counterfeit credit cards. But fraud experts say recent developments
suggest both trends are about to change and likely for the worse.]]></description>
		<content:encoded><![CDATA[<p>COVID-19 Breach Bubble&#8217; Waiting to Pop?<br />
<a href="https://krebsonsecurity.com/2020/06/covid-19-breach-bubble-waiting-to-pop/" rel="nofollow">https://krebsonsecurity.com/2020/06/covid-19-breach-bubble-waiting-to-pop/</a><br />
The COVID-19 pandemic has made it harder for banks to trace the source<br />
of payment card data stolen from smaller, hacked online merchants. On<br />
the plus side, months of quarantine have massively decreased demand<br />
for account information that thieves buy and use to create physical<br />
counterfeit credit cards. But fraud experts say recent developments<br />
suggest both trends are about to change and likely for the worse.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
