Page 89 - cdm-2014
P. 89










Federal Agents Seek to Loosen Rules on Hacking Computers

05/09/2014 00:21 (Bloomberg)
...molester and know an IP address, and then obtain a warrant to use malware to find the actual location. In the case of
botnets, malware might...




Red tape delayed federal network fixes to Heartbleed virus by several days

05/08/2014 23:47 (FederalNewsRadio.com)
Red tape delayed federal network fixes to Heartbleed virus by several days An untold number of federal IT systems
potentially were left vulnerable...




Data sovereignty laws hamper international crime investigations: AFP

05/08/2014 23:03 (Computer World Singapore)

Data sovereignty laws hamper international crime investigations: AFP International cyber crime police work is being
hampered by data sovereignty...




Fake Instagram 'Image Viewers' Are Latest Malware Fad

05/08/2014 18:47 (Yahoo! News)
...out there could pose greater risk than, say, your average phishing site," Malwarebytes intelligence analyst Jovi Umawing
wrote in a company blog...



DHS and Big Data


05/08/2014 16:58 (KMI Media Group)
...new technologies, policies and practices to mitigate physical, as well as cyber, security issues to the U.S. homeland and
our international community,




Pentagon App Store Is Open, but the Shelves Are Pretty Bare

05/08/2014 16:08 (Nextgov)
...tablets. And there are two Fixmo applications that provide defense-grade security and mobile device tamper detection.
Meanwhile, two other apps make...





! " $ !
! # ! "
   84   85   86   87   88   89   90   91   92   93   94