Page 86 - CDM-Cyber-Warnings-January-2014
P. 86
4 steps to fix off-track IT projects 01/22/2014 17:23 (Federal Times) ...federal IT procurement practices. In another recent example, the Air Force abandoned a $1 billion investment in a supply chain modernization... DDoS Web Attacks Rise in 2013, Harder To Fend Off 01/22/2014 17:00 (CIO Today) but they are now harder to defend against due to more sophisticated malware. "Prolexic noted a clear evolution in the strategies and tactics... Android Hole Allows Data Capture 01/22/2014 16:31 (Isssource.com) At the time, Samsung issued an official response saying the attack exploited legitimate Android network functions in an unintended way for a... Cybersecurity could be the next bipartisan breakthrough 01/22/2014 16:00 (The Hill - Blog) ...cyber vulnerabilities. This legislation, the National Cybersecurity and Critical Infrastructure Protection (NCCIP) Act, is coming together at... Android Malware Acts as Security Update 01/22/2014 15:17 (Isssource.com) Android Malware Acts as Security Update There are six versions of a new Android threat designed to steal SMS messages and intercept phone calls, DISA considers unified capabilities in the cloud 01/22/2014 15:06 (Federal Times) ...Agency. DISA is considering what capabilities it will build within DoD s current infrastructure and whether commercial clouds can provide the service, + % %! ! & , ! . !( %+ ' "! "#+% ' - + % !& , ! % '& % & %) *"% *