Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Conficker
The Conficker Worm is still out there, and nasty as ever; also, why cybersecurity is the hot career choice for 2010.
Sept. 10, 2009
Secret Service helps Poughkeepsie recoup losses from cybertheft
The Conficker worm was first detected in 2008, but cybersecurity experts are still battling it.
Microsoft has admitted that its Internet Explorer was a weak link in the recent attacks on Google's systems that originated in China; and Conficker still out there.
When it comes to Conficker, what are the lessons learned and how can the public and private sectors work together to defeat it? We ask Neustar's Rod Joffe.
Microsoft slates 25-patch Windows update for next week, many PCs still vulnerable to Conficker worm, Chinese ISP momentarily hijacks the Internet
Internet Storm Center,
April 9, 2009