Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
New worm spreads via Yahoo instant messenger
Friday - 5/7/2010, 5:43pm EDT
Cybersecurity Update - Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on The Federal Drive with Tom Temin and Jane Norris (6-10 a.m.) and The Daily Debrief with Chris Dorobek and Amy Morris (3-7 p.m.). Listen live at FederalNewsRadio.com or on the radio at 1500 and 820 AM in the Washington, D.C. metro area.
A worm has been spreading via Yahoo Instant Messenger. The worm tricks people into downloading what they think is a photo from a friend, but instead it is malware that installs a backdoor on Windows systems and spreads to a victim's IM contacts, CNet reports. The worm arrives via a message from a contact with the word "photo" or "photos" and a smiley face icon, along with a link to a Web site resembling a Facebook page, MySpace page, or some other page where photos might reside. According to Symantec, the anti-virus company, the executable file on on Windows systems will download and if the user runs the file, the computer will become infected and the malicious message will be distributed to all of the IM contacts.
- The Justice Department's battle against counterfiet computer equipment has scored a victory -- 30 victories, in fact. The Departments of Justice and the Homeland Security have announced that they won 30 felony convictions and seized $143 million worth of counterfeit network computer equipment manufactured in China. It came out of an initiative called Operation Network Raider. The announcement came as a Saudi citizen living in Sugarland, Texas, was sentenced to 51 months in prison. He was ordered to pay $119,400 in restitution to Cisco Systems Inc., whose network hardware is a prime target of counterfeiters. Ehab Ashoor, 49, bought counterfeit Cisco equipment from an online vendor in China intending to sell it to the U.S. Marine Corps in Iraq for transmitting troop movements, relaying intelligence and maintaining security for a military base west of Fallujah, according to evidence at the trial.