Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: malware
"Drive-by" malware infected more than ten million computers in February, according to a statistical analysis by Barracuda Labs. "Drive-by" malware describes files that people download from a site without knowing where it came from or what it really does.
The National Security Agency has developed a better — and more economical approach — to fighting malware. Eric Chudow, a technical director for government mitigations in the NSA's Information Assurance Directorate, joined In Depth with Francis Rose to discuss the new method.
The CIA says its private sector funding arm, In-Q-Tel, will work with Reversing Labs to develop a program it will offer to both the public and private sectors.
AlienVault Labs said it has found evidence of a trojan that tries to compromise the standard authentication cards, by working its way into the card readers.
Steve Vinsik, vice president and partner, Global Security Solutions for Unisys Corporation, joins host John Gilroy to talk about biometrics, border protection, air cargo, and telework.
January 3, 2012
Tags: technology , Unisys , biometrics , border protection , telework , NSTIC , biometric security , Unisys Security Index , Steve Vinsik , John Gilroy , Federal Tech Talk , cloud computing , cyber security
Hackers are sending out malware disguised as a file in an email from security firm Symantec.
Topping the annual list is malware targeting Android-powered mobile devices and Apple computes.
The malware was originally written for Linux nearly ten years ago, but hackers are recompiling the code to make it run on Mac OS X.
The Stuxnet worm doesn't have a twin after all. Last month Symantec discovered a malware threat with such strong similarities to Stuxnet they called it the Son of Stuxnet.
If you get an e-mail asking you to download a Census form, don't do it.