Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: computer virus
On Monday, the FBI turned off servers that had allowed thousands of computers infected with the DNSChanger virus to continue using the Internet.
The Wall Street Journal reported the largest Internet service providers took steps Sunday to make sure infected machines could stay online.
The National Security Agency and the CIA helped Israel develop the "flame" computer virus.
The Flashback Trojan that infected more than 600,000 Apple computers at its height has been largely contained, according to a new report in TechNews World. But cybersecurity experts warned that new variants still pose a threat.
They are back online now, but it was a tough week for the U.S. Marshals Service. A good old fashioned computer virus infected the agencies' PCs. That forced officials to disconnect them from the Internet for a few days while the tech staff performed a clean out and upgrade. Turns out that for the Marshals, only 140 machines were affected. But the incident reinforced the basic cyber security advice: Keep your anti-virus software updated. I'm Tom Temin.
Rodney Joffe, senior vice president and chief technology officer at Neustar, is one of the most knowledgeable people about the structure of Stuxnet. He joins host Tom Temin for this week's Federal Security Spotlight.
October 21, 2010
Activity by the notorious password-stealing Zeus botnet is already on the rebound, Krebs on Security reports.
Host Tom Temin discusses new, innovative ideas for dealing with computer viruses. His guest this week - Jeannette Wing, the chair of the Computer Science department at Carnegie Melon University and former employee at the National Science Foundation.
October 14, 2010
SCMagazineUS.com reports that the malware author who uses the handle "iraq_resistance" is believed to be part of the cyber-jihad organization "Brigades of Tariq ibn Ziyad."