Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Host Tom Temin brings you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
Is your BlackBerry spying on you?
Friday - 5/21/2010, 8:30am EDT
- You may consider your cell phone or smart phone a life-saver, bringing instant communication at your fingertips. But your cell phone can also be used to spy on you, without you even realizing it. Spyware can get onto your phone through an email or text message with a trojan horse, or through a computer connected to your phone when you're not looking. CBS 11 in Dallas reports the spyware can then turn on your cell phone's microphone and allow someone to listen in to your conversations with someone else in a room -- even when you're not on your phone. Experts say up to six million of the estimated 200 million cell phones in the U.S. could be infected. Research in Motion, maker of the smartphone used by most federal employees, says its phones are designed with a number of application controls to make it more difficult for spyware to be placed on its phones... Difficult, but not impossible.
- The federal cybersecurity landscape could be changing in big ways. The House Oversight and Government Reform Committee has approved a bill to revamp laws aimed at protecting government systems. The Federal Information Security Amendments Act would lock in a permanent federal cybersecurity coordinator and chief technology officer. It would also require agencies to monitor their networks in real-time, and eliminate the need for managers to file periodic paperwork that certifies compliance with an existing information security law -- FISMA. The bill now goes to the full House floor.
Check out all of Federal News Radio's coverage of cybersecurity issues here.