Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews on our daily show blogs.
Cyber lab turns to cryptology experts for help
Wednesday - 8/15/2012, 8:51am EDT
ComputerWorld reports, Kaspersky figured out Gauss is spread using USB memory sticks. But much of the code is encrypted using a key called RC4.
Gauss is suspected of being related to Stuxnet, the 2010 virus that helped wreck Iranian nuclear centrifuges. The federal government was later found to have had a hand in developing Stuxnet. Gauss spies on financial activity at banks in the Middle East.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.