Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: malware
WFED's Jared Serbu has more information on Defense Advanced Research Projects Agency's CRASH project
DARPA Deputy Director Ken Gabriel explains how a new security program came out of a workshop with infectious disease biologists.
CNET reports cybersecurity experts are still confounded by the malware virus Stuxnet.
Info Security reports that smartphones and online banking present the top cyber threats.
Mac computers are not immune anymore. A new malware attack on the popular operating system.
Rodney Joffe, senior vice president and chief technology officer at Neustar, is one of the most knowledgeable people about the structure of Stuxnet. He joins host Tom Temin for this week's Federal Security Spotlight.
October 21, 2010
Many popular smartphone applications release consumers' personal information without their knowledge.
Adult web sites have long been thought of as the riskiest place to get a computer virus, but you're actually more likely to download malware on popular sites, such as Facebook and Twitter, CSO Magazine reports.
DHS's Sean McGurk and other cybersecurity experts are trying to protect agency networks against one of the most dangerous viruses ever developed. Stuxnet exploits a vulnerability in Siemens industrial equipment control software and hardware and may be the product of a nation bent on sabotage.
Learn more in today's cybersecurity update