Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity Report
A British scientist claims to be the first human to have been infected (so to speak) with a computer virus after he contaminated an electronic chip which was inserted into his hand. Dr Mark Gasson, of the University of Reading, says the device was programmed with a virus which could transfer itself to other electronic systems that it came in contact with, raising the possibility that in the future, advanced medical devices like pacemakers could become vulnerable to cyber attack.
It could be a small win in the fight against malicious botnets. An Internet service provider known for hosting command and control channels for the Zeus botnet has been knocked offline. Media reports say the company was based in Russia. The take-down happened when the firm's upstream service provider shut down it's connection. It's unclear, however, what effect the move might have as, often, hackers who run botnets will move to other service providers.
Many say for the government to secure their own networks, it must work more closely with the private sector.
The Homeland Security Department, and other agencies, are now testing out just how that approach might work. That Department is in the middle of several pilot programs to improve how the government and industry share information related to cyber threats.
One goal is to make the sharing of classified information easier, such as an expansion of the post-9/11 Network Fusion Centers used in every state.
Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.
Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.
The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.
There could be some great cybersecurity jobs out there for veterans who want to continue working as civilians in the federal government. Craig Newmark, the founder of CraigsList, writes in the Huffington Post Blog that there is a shortage of cybersecurity experts, and that veterans tend to have strong commitment and good attitudes. While the GI Bill will pay for a veteran's education, some colleges shut down during the summer months - which means tuition payments would stop, while the federal government is looking to train people year round.