Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: hacker
A group called AntiSec says it has knocked OnGuardOnline.gov offline late Monday. The Federal Trade Commission-run website is a partnership among 14 federal agencies.
The spyware was designed to steal your information, and open the network for even worse cyber attacks.
Panda Labs researchers say the Trojan virus accounts for three out of every four new virus strains created last quarter.
The malware was originally written for Linux nearly ten years ago, but hackers are recompiling the code to make it run on Mac OS X.
The Stuxnet worm doesn't have a twin after all. Last month Symantec discovered a malware threat with such strong similarities to Stuxnet they called it the Son of Stuxnet.
Learn all about it, and a criminal who hacked into 49 Congressional Web sites, in today's cybersecurity update.
You are under cyber attack. That's the top finding of a new report, In the Crossfire: Critical Infrastructure in the Age of Cyberwar. The survey was commissioned by IT security giant McAfee and authored by the Center for Strategic and International Studies (CSIS).
GAO to release FDCC and TIC audits, TechAmerica spent $378,000 in 4Q lobbying, NIPRNET to get Web 2.0 guidance
The personal details of millions of job seekers have been stolen.