by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : August 30, 2014
current and former NASA employees was stolen from the vehicle of a NASA employee. Together, the incidents resulted in NASA spending $900,000 on credit-monitoring services for affected individuals. An Environmental Protection Agency contractor alleg- edly opened a virus-tainted email attachment in March 2012, allowing an external source to access EPA s servers and com- promise 8,000 users Social Security numbers, bank account information and home addresses. EPA of cials waited six months to notify the people whose information was com- promised. In June 2012, the Navy s SmartWeb Move and DHS' Transportation Worker Identi cation Credential websites were hacked by a group called Digital Corruption. The hack- ers used blind SQL injection to gain access to the agen- cies databases. The information compromised in the attack included usernames, passwords, email IDs, and the security questions and answers for all users of the two sites. 2011: Targeting the Pentagon, the Senate and the national laboratories In March 2011, an unspeci ed foreign intelligence service directed a cyberattack at a U.S. defense contractor that resulted in the theft of 24,000 les from the Pentagon. Although little was publicly released regarding the incident, it is speculated that the stolen les contained classi ed information. According to then-Deputy Defense Secretary William Lynn III, incidents like this one have resulted in the loss of les concerning "our most sensitive systems, including avionics, surveillance technologies, satellite com- munications systems and network security protocols." In response to a Defense Department report claiming that the United States would consider cyberattacks an "act of war upon the U.S. government," a black-hat hacker organiza- tion named Lulz Security breached the servers of Senate. gov and released internal information from the Senate s computer network in June 2011. None of the information released by LulzSec --- including users email addresses and passwords and portions of the website s root directory --- was considered con dential, but the group showed it could access the Senate s computer network with relative ease and without funding or af liation. In July 2011, several sophisticated cyberattacks targeted two of DOE s national laboratories and one of its private- sector operators. No classi ed information was thought to have been compromised, but of cials at the labs were forced to shut down computer network services for several days while they investigated the incidents. ■ Flashback 32 August 30, 2014 FCW.COM FCW Has Gone Mobile. Go to fcw.com/tablet to download the tablet app today! Your mobile fcw.com experience --- optimized. isit fcw.com from your smartphone and enjoy the easier avigation and new sharing options Y e Vi na
September 15, 2014
August 15, 2014