Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: cybersecurity report
The editor-in-chief of the controversial web site Wikileaks' is sending out pleas for financial and legal help. Julian Assange is looking for some support in the formation of local "Friends of WikiLeaks" chapters to help build out the site's mission to (ostensibly) protect whistleblowers, journalists and activists. With pressure on the site coming from several directions - possibly including the Pentagon - regarding its publication of potentially sensitive information - Assange has sent out emails with the header "WikiLeaks may be under attack."
Deputy Secretary of Defense William Lynn traveled to Ottawa recently to try and drum up support for a new international organization to combat cyber warfare. He told the Canadian audience the U.S. can't defend its networks alone, and pointed to increasing threats from hackers and computer viruses. The visit marked the kick-off a U.S.-led initiative to create such an international organization. Discussions have begun with several countries.
The General Services Administration and Homeland Security Department have approved the first government-wide provider of cybersecurity services under the Networx telecommunications contract. AT&T has received authority to operate its Managed Trusted IP Services (or MTIPS) program, a move that took almost a year to approve. Qwest, Sprint and Verizon also received awards to be MTIPS providers, but have not received the authority to operate on a governmentwide basis.
The Department of Homeland Security is putting together a report on the global response to Conficker Worm attacks, while analysts warn, the Worm is still alive and well, though probably well hidden. Atlantic Monthly columnist Mark Bowden says, botnets like the Conficker Worm are evidence that worms and viruses are now being developed by those who have intricate knowledge of cryptography, a prospect that makes defending against attacks increasingly difficult.
The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren't sure what the command is supposed to do: protect the Pentagon's networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.
Dubbed tab-napping, a new type of attack has been using Java script to secretly change the content of open, but idle, tabbed browser windows.
Even hours after opening them, users may see familiar-looking log-in windows for their online shopping or e-mail accounts. But, credential information used to log-on may actually be sent to hackers. Analysts caution, all of the major browsers for Windows 7 and Mac Operating Systems are potentially vulnerable.
A British scientist claims to be the first human to have been infected (so to speak) with a computer virus after he contaminated an electronic chip which was inserted into his hand. Dr Mark Gasson, of the University of Reading, says the device was programmed with a virus which could transfer itself to other electronic systems that it came in contact with, raising the possibility that in the future, advanced medical devices like pacemakers could become vulnerable to cyber attack.
It could be a small win in the fight against malicious botnets. An Internet service provider known for hosting command and control channels for the Zeus botnet has been knocked offline. Media reports say the company was based in Russia. The take-down happened when the firm's upstream service provider shut down it's connection. It's unclear, however, what effect the move might have as, often, hackers who run botnets will move to other service providers.
Many say for the government to secure their own networks, it must work more closely with the private sector.
The Homeland Security Department, and other agencies, are now testing out just how that approach might work. That Department is in the middle of several pilot programs to improve how the government and industry share information related to cyber threats.
One goal is to make the sharing of classified information easier, such as an expansion of the post-9/11 Network Fusion Centers used in every state.
Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.
Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.
The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.