Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Millions of computers still vulnerable after FBI cyber bust
Monday - 3/26/2012, 8:11am EDT
The FBI's Operation Ghost Click took down an Estonian Internet fraud ring running criminal DNS servers in November. FBI allowed the servers to run for 120 days to give owners of infected computers time to clean out the DNSchanger malware. But the bureau dropped the ball on getting the word out.
Government Computer News reports days before the deadline to take servers down, millions of computers remained infected. Government agencies, though, had largely cleaned their systems. A federal judge has extended the deadline to July 9th.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.