bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
11:11 am, October 21, 2014

Search Result

Search Tags:  hackers

Government hackers attempt to break into Healthcare.gov

Government hackers see a way to break into Healthcare.gov, but in some ways that's good news. Cyber experts from the Health and Human Services Inspector General's Office found a big hole in the site's security system. But once the hackers found the hole and tried to exploit it, the site's defense system blocked them. The agency says its working to fix the problem.

Tags: HealthCare.gov , HHS OIG , GDIT , GDIT Enterprise Center

Monday - 10/06/2014, 10:48am EDT

Chinese military hackers busted

The Associated Press is reporting that China's military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times. They broke into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline's computers. A year-long investigation by the Senate Armed Services Committee identified at least 20 break-ins or other unspecified cyber events targeting companies.

Tags: Chinese military , Senate Armed Services Committee , DoD , Pentagon and Beyond , JJ Green

Wednesday - 09/17/2014, 05:54pm EDT

Do's and don'ts for feds on vacation

Federal employees are a prime target for hackers and other bad guys when on vacation. Learn 12 tips for keeping you and your federal-issued laptop safe while out of the office this summer.

Tags: vacation , workforce , cell phone , laptop , cybersecurity , Jerry Irvine , Prescient Solutions , Lauren Larson

Friday - 08/01/2014, 04:20pm EDT

Jerry Irvine, CIO and Partner of Prescient Solutions

Federal employees are prime targets for hackers. If not properly secured, the computers and mobile devices they carry could open up their agency's network to malicious attacks. Devices can be especially vulnerable when you're on vacation and it's easy to let your guard down. Jerry Irvine is the chief information officer and a partner of Prescient Solutions. He told Tom Temin and Emily Kopp on the Federal Drive what feds should be aware of when they're traveling.

Tags: Jerry Irvine , Prescient Solutions , cybersecurity , vacation , technology

Thursday - 07/31/2014, 03:58pm EDT
Listen

Steve Bucci, Heritage Foundation

Federal officials say Chinese hackers broke into the networks of the Government Accountability Office and the Government Printing Office back in March. While news of Chinese cyber attacks on federal agencies isn't unprecedented, the March attacks, first reported by the New York Times, have some observers scratching their heads. They say it's unclear why those two agencies would be targeted -- particularly in the case of GPO. Steve Bucci is director of the Douglas and Sarah Allison Center for Foreign and National Security Policy at the Heritage Foundation. He's also former deputy assistant Defense secretary. He said the attacks shouldn't come as a surprise on In Depth with guest host Jared Serbu.

Tags: Steve Bucci , Heritage Foundation , GAO , GPO

Friday - 07/18/2014, 04:10pm EDT
Listen

As cyber attackers get more sophisticated, so must agencies' protections

Cyber criminals are adjusting so quickly that it's become an 'arms race' between them and agency technology officers trying to guard against threats. During a recent Federal News Radio panel discussion, officials shared expertise and tactics for protection.

Tags: Bob Bigman , Darren Van Booven , Ben Rubin , Lance Dubsky , Tony Cole , cybersecurity , IT , Dena Levitz , technology

Friday - 07/18/2014, 02:29pm EDT

Report: Chinese hackers hit OPM networks

Chinese hackers broke into OPM computer networks earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to a media report. OPM tells Federal News Radio, "neither OPM nor US-CERT have identified any loss of personally identifiable information."

Tags: OPM , Chinese , DHS , US CERT , cybersecurity , technology

Thursday - 07/10/2014, 01:31pm EDT

DoD reveals strategy to protect itself from hackers

The Department of Defense recognizes that it and American companies are prime targets for hackers, whether they be a nation-state or individuals. So it's put in place an operating strategy. That strategy is comprised of 5 elements: 1) a defensible architecture; 2) global situational awareness and a common operating picture; 3) a concept for operating in cyberspace; 4) trained and ready cyber forces; and 5) capacity to take action when authorized.

Tags: DoD , operating strategy , Cybersecurity Report , cybersecurity , JJ Green

Thursday - 06/05/2014, 08:51am EDT

Official describes rampant computer hacking at VA

Jerry Davis, who served as the VA's chief information security officer until February 2013, testified at a House subcommittee hearing that the VA became aware of the computer hacking in March 2010 and that attacks continue "to this very day."

Tags: Jerry Davis , VA , cybersecurity , cyber attacks , Stephen Warren

Tuesday - 06/04/2013, 07:41pm EDT
  • 1
  •