Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
New worm spreads via Yahoo instant messenger
Friday - 5/7/2010, 5:43pm EDT
Cybersecurity Update - Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on The Federal Drive with Tom Temin and Jane Norris (6-10 a.m.) and The Daily Debrief with Chris Dorobek and Amy Morris (3-7 p.m.). Listen live at FederalNewsRadio.com or on the radio at 1500 and 820 AM in the Washington, D.C. metro area.
A worm has been spreading via Yahoo Instant Messenger. The worm tricks people into downloading what they think is a photo from a friend, but instead it is malware that installs a backdoor on Windows systems and spreads to a victim's IM contacts, CNet reports. The worm arrives via a message from a contact with the word "photo" or "photos" and a smiley face icon, along with a link to a Web site resembling a Facebook page, MySpace page, or some other page where photos might reside. According to Symantec, the anti-virus company, the executable file on on Windows systems will download and if the user runs the file, the computer will become infected and the malicious message will be distributed to all of the IM contacts.
- The Justice Department's battle against counterfiet computer equipment has scored a victory -- 30 victories, in fact. The Departments of Justice and the Homeland Security have announced that they won 30 felony convictions and seized $143 million worth of counterfeit network computer equipment manufactured in China. It came out of an initiative called Operation Network Raider. The announcement came as a Saudi citizen living in Sugarland, Texas, was sentenced to 51 months in prison. He was ordered to pay $119,400 in restitution to Cisco Systems Inc., whose network hardware is a prime target of counterfeiters. Ehab Ashoor, 49, bought counterfeit Cisco equipment from an online vendor in China intending to sell it to the U.S. Marine Corps in Iraq for transmitting troop movements, relaying intelligence and maintaining security for a military base west of Fallujah, according to evidence at the trial.