Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
A computer virus has infected more than 600,000 Apple computer, alarming IT security professionals, who are unaccustomed to seeing a Mac attack.
Charles De Sanno from the Department of Veterans Affairs and Booz Allen Hamilton's Ilene Yarnoff will talk about mobile apps and mobile security issues in the federal workplace. April 6, 2012
The experts said too many chief information security officers have a compliance mentality. It's more important to understand the organization's mission and focus on protecting its most important data.
The FBI's Criminal Justice Information Services says local law enforcement needs to encrypt its data if it wants to join the cloud. The FBI said when information is encrypted from the start, police can have control of its cybersecurity on any cloud system, according to a post on InfoSecurity.
Several advocacy groups have raised major civil-liberties concerns about pending cybersecurity legislation, claiming the language may unfairly expose personal information and punish those who hide it.
Microsoft received 20 submissions in a contest to come up with new security technologies. The company's Blue Hat Prize will pay the winner $200,000.
A federal utility powering a third of the Pacific Northwest is vulnerable to computer breaches. An Energy Department audit found the Bonneville Power Administration, which services hospitals, banks, and critical military installations accounts for 30 percent of the region's power.
While Congress debates several new cybersecurity bills, a Congressional Research Service reports shows the government is already involved in regulating cybersecurity.
Jim Harper, senior policy analyst at the conservative Cato Institute, says that some of the cybersecurity bills Congress is considering are overreaching and may be unnecessary in the long run.
"Drive-by" malware infected more than ten million computers in February, according to a statistical analysis by Barracuda Labs. "Drive-by" malware describes files that people download from a site without knowing where it came from or what it really does.
The cybersecurity response center at the IRS is mostly working, according to a new report from the Treasury Inspector General for Tax Administration. However, in the report, Treasury Inspector General J. Russell George said that the Computer Security Incident Response Center isn't reporting every computer security incident as it's supposed to.
The legislative committee of the Council of the Inspectors General has weighed in on two Senate cybersecurity bills. The Cybersecurity Act of 2012 was introduced by Sens. Joe Lieberman (I-Conn.), Susan Collins (R-Maine) and Jay Rockefeller (D-W.Va.). Sen. John McCain (R-Ariz.), introduced the SECURE IT act.
A group calling itself \"Lulzsec Reborn\" claims to have hacked into the private information of 170,000 members of a military dating website. However, the owner of the website disputed the claim, since the dating service has only 140,000 members.
Agencies and companies can use CAPTCHA to make sure only people, and not bots, access certain websites.