Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
How to become a hacker in 15 minutes
Wednesday - 5/12/2010, 8:30am EDT
- Coming soon to your computer: Tweets called "How to Become a Hacker in 15 Minutes". Today, Ligatt Security International launches an effort to teach how hackers operate so users can avoid being victims. The daily tweets will feature "tips on how an attacker could break into a user's wireless network, find someone via his or her email address, and break into a PC to steal personal information," according DarkReading.com
- An upcoming upgrade to your Web experience could unlock your computer's door for hackers. Security experts say that HTML version 5 could let criminals steal information from your computer. The Web programming language is designed to improve performance and multimedia, like video. It would reportedly eliminate the need for managing browser plug-ins, like Adobe Flash. But an expert cited at DarkReading.com says HTML 5 also lets developers store more program information on your computer, giving hackers a chance to launch what's called an SQL injection attack. HTML 5 is currently a working draft and could be finalized late this year or in 2011.
- The FBI is planning a prosecution drive to break up rings of cyber criminals who steal money from bank accounts, reports the Wall Street Journal. Special effort will be devoted to rooting out so-called cyber mules, who turn online funds into hard cash. The plan was outlined at a cyber security event for small business hosted by the Federal Deposit Insurance Company. Criminals typically use man-in-the-browser malware to fool financial officers in state and local government and small business into giving up their banking credentials. The information is used to quickly withdraw money electronically, then transfer it in small quantities to online mules. The mules withdraw the money from their own accounts. Banks often refuse to cover the losses since they were incurred using legitimate credentials.