Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: botnet
The Industry Botnet Group — coordinated by the White House Cybersecurity Office and the Departments of Commerce and Homeland Security — has posted nine principles, including coordination of cyber responsibilities across sectors and reporting lessons learned.
"Weaponized Word" files are starting to tear up Mac computers, InfoSecurity reports. The documents take advantage of an existing weakness in the Mac version of Microsoft Office.
Hackers responsible for the botnet known as Duqu, have been clearing their tracks. Computerworld reports the hackers have cleraed and cleaned all their known servers all the way back to 2009.
And FTC notifies companies about P2P data loss
It appears that the botnet is also in the business of renting out its reach and download capability to cybercriminals.
Cybersecurity chief Schmidt opens CNCI 'Einstein 3' kimono, major botnet busted
Rent-a-botnet attack for $9 an hour, Macs under attack by spyware
In a move to control the contollers, criminal servers have been swapped for government servers to intercept communications between infected systems and the servers controlling them.
"Detonating" file copies in a sandbox to examine whether any document contains malicious content stops malware before it can enter your network.
The senate is considering a bill that would require all private sector companies to report cyber attacks.