Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: computer virus
On Monday, the FBI turned off servers that had allowed thousands of computers infected with the DNSChanger virus to continue using the Internet.
The Wall Street Journal reported the largest Internet service providers took steps Sunday to make sure infected machines could stay online.
The National Security Agency and the CIA helped Israel develop the "flame" computer virus.
The Flashback Trojan that infected more than 600,000 Apple computers at its height has been largely contained, according to a new report in TechNews World. But cybersecurity experts warned that new variants still pose a threat.
They are back online now, but it was a tough week for the U.S. Marshals Service. A good old fashioned computer virus infected the agencies' PCs. That forced officials to disconnect them from the Internet for a few days while the tech staff performed a clean out and upgrade. Turns out that for the Marshals, only 140 machines were affected. But the incident reinforced the basic cyber security advice: Keep your anti-virus software updated. I'm Tom Temin.
Rodney Joffe, senior vice president and chief technology officer at Neustar, is one of the most knowledgeable people about the structure of Stuxnet. He joins host Tom Temin for this week's Federal Security Spotlight.
October 21, 2010
Activity by the notorious password-stealing Zeus botnet is already on the rebound, Krebs on Security reports.
Host Tom Temin discusses new, innovative ideas for dealing with computer viruses. His guest this week - Jeannette Wing, the chair of the Computer Science department at Carnegie Melon University and former employee at the National Science Foundation.
October 14, 2010
SCMagazineUS.com reports that the malware author who uses the handle "iraq_resistance" is believed to be part of the cyber-jihad organization "Brigades of Tariq ibn Ziyad."