Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Millions of computers still vulnerable after FBI cyber bust
Monday - 3/26/2012, 8:11am EDT
The FBI's Operation Ghost Click took down an Estonian Internet fraud ring running criminal DNS servers in November. FBI allowed the servers to run for 120 days to give owners of infected computers time to clean out the DNSchanger malware. But the bureau dropped the ball on getting the word out.
Government Computer News reports days before the deadline to take servers down, millions of computers remained infected. Government agencies, though, had largely cleaned their systems. A federal judge has extended the deadline to July 9th.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.