Are cybersecurity buzz words overused?

Monday - 7/12/2010, 3:54pm EDT

Cybersecurity Update - Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on The Federal Drive with Tom Temin and Amy Morris (6-10 a.m.) and DorobekInsider with Chris Dorobek (3-5 p.m.). Listen live at FederalNewsRadio.com or on the radio at 1500 and 820 AM in the Washington, D.C. metro area.

  • Tired of spam on your twitter account? So is Google -- and they're shelling out the money to fund anti-spam research. Researchers at Texas A&M University are creating fake accounts on Twitter to lure spammers who are eager to spread malware. The fake accounts automatically post updates drawn from a collection of more than 1-hundred-thousand real tweets. So far the more than 60 fake twiter accounts have collected more than 30-thousand spammers on Twitter. PC World reports the fake accounts try not to mimic a real person and are allocated to a dark address space. Real Twitter users are segregated from the spammers.

  • Information security experts are very picky with the words they use -- and they're upset by the catch phrases they hear in media and industry reports. It's an old problem -- vendors, public-relations firms and the media create easy-to-remember buzz words to describe the latest threat or technological solution. But often time those words don't accurately describe the problem. CSO Online examines this issue in a recent post, and says that -- until someone comes up with something better -- the buzz words will probably remain. We want to know what you think -- are the cybersecurity buzz words overused? Or wrongly used? Email us and let us know!

Check out all of Federal News Radio's coverage of cybersecurity issues here.