Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Host Tom Temin brings you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
ATM attacks show cybersecurity holes
Thursday - 7/29/2010, 8:30am EDT
- A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them. The attacks demonstrated Wednesday in Las Vegas targeted standalone ATMs. But they could potentially be used against the ATMs used by mainstream banks. Computer hacker Barnaby Jack spent two years tinkering in his Silicon Valley apartment with ATMs he bought online. His goal was to find ways to take control of ATMs by exploiting weaknesses in the computers that run the machines. He showed off his results at the Black Hat conference, an annual gathering devoted to exposing the latest computer-security vulnerabilities.
- A security researcher has found Russian cyber criminals using a botnet to produce counterfeit checks. Joe Stewart of SecureWorks says it's a highly automated scheme. The botnet breaks into online services for check archiving and verification. The scammers use the stolen financial information from those services to produce fake checks. Stewart says the crime gang then uses money mules to cash the bogus checks.
- The Commerce Department wants to hear from the private and academic sectors about their cyber security challenges and strategies. Secretary Gary Locke is using his Internet Policy Task Force to gather best cyber security practices as part of an initiative to maintain growth and innovation on the Internet. In a speech, Locke said security and confidence in the Internet are crucial. Commerce will issue a report to the president on cyber security later this year, reports NextGov. Hear more at 10:05 this morning, when the Federal Security Spotlight will present an interview with Mark Berejka, co-chair of the task force.
Check out all of Federal News Radio's coverage of cybersecurity issues here.