Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
Viruses found embedded in smartphone apps
Tuesday - 8/3/2010, 8:30am EDT
- Internet-enabled smart phones are all the rage and hackers are taking notice. About 80 apps for the Google Android were recently found to be viruses that could harvest all your phone numbers; Google has since taken them down. Another virus is spread by a popular 3-D game delivered as a web app, it makes your smartphone dial out to far-flung places like Somalia. USA Today reports despite the attacks, Web app infections are rare compared to the number of viruses that infect PCs.
- An Energy Department report reinforces concerns about cyber security of the nation's electric grid. DOE assessed two dozen control systems over several years and concluded that unsafe coding practices leave them vulnerable to surveillance and hackers. Intruders could redirect electricity, steal data, even shut down parts of the grid, the report warns. The study was conducted by the Idaho National Lab. "Poor code quality leads to vulnerabilities and bugs in the code that not only make it vulnerable to attack, but also fragile and unstable," the report said. The Wall Street Journal reports many of the security vulnerabilities are common and easy to fix, such as poor password management.
Check out all of Federal News Radio's coverage of cybersecurity issues here.