Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: malware
Learn more in today's cybersecurity update.
Hear a clip of tomorrow's Federal Security Spotlight.
IT company gives its thoughts on what will be most prominent for managers in 2010.
In-Q-Tel, the venture capital company created by the CIA, has partnered with FireEye to defend against malware attacks.
Security researcher Sean-Paul Correll talks more about what his company found.
Jan. 14, 2010
More than two million more web pages were infected with malware during the third quarter of 2009 compared to the same quarter in 2008.
It appears that the botnet is also in the business of renting out its reach and download capability to cybercriminals.
Greg Schaffer, the acting deputy undersecretary for the National Protection and Programs Directorate at DHS, said in Information Week that it's is one of the most complicated and difficult challenges they have.
Marketing could be the new required course for would be cyber criminals.
Most of the messages came disguised as package-tracking emails from UPS or DHL.