Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The U.S. is host almost half of the systems infected with the botnet kownn as SpyEye, according to a new study from South Korea-based AhnLab.
\"Weaponized Word\" files are starting to tear up Mac computers, InfoSecurity reports. The documents take advantage of an existing weakness in the Mac version of Microsoft Office.
The Federal Aviation Administration has chosen cybersecurity firm Lunarline to lock down personally identifiable information in its systems. The company says it\'ll help the agency prevent unauthorized access and disclosure of such material.
Center CIO Mike Bolger said encrypting laptops and implementing logical access are among his top priorities in 2012. Kennedy Space Center also is exploring how to let employees using their personal smartphones or tablet computers on the network. March 29, 2012
Gregory Wilshusen, GSA\'s director of information security issue, discussed a recent report about IT supply chain risks with The Federal Drive with Tom Temin and Emily Kopp
Kshemendra Paul, Information Sharing Environment\'s program manager, joined The Federal Drive with Tom Temin and Emily Kopp at the Acquisition Excellence Conference in Washington.
The National Telecommunications and Information Administration told a House panel it is trying to expand deployment of technology known as DNS-SEC.
The Pentagon still is responding to major cyber attacks on the nation after the fact, the military\'s top cyber official said Tuesday. It would rather stop them before they succeed.
Two GAO reports find agencies lack oversight and controls over ensuring vendors buy the components for hardware and software from trusted sources. DoD is ahead of most agencies. It is using intelligence expertise to secure the supply chain of national security systems.
The House Oversight and Government Reform Committee unveiled a bill to overhaul a decade-old law detailing how federal agencies protect their computer networks from cybersecurity threats. Rep. Darrell Issa (R-Calif.), the chairman of the committee, told Federal News Radio the Office of Management and Budget is better poised to be a \"fair arbitrator\" than the Homeland Security Department.
Howard Schmidt, on his blog, lists the areas for improvement within federal cybersecurity.
FBI allowed the servers to run for 120 days to give owners of infected computers time to clean out the DNSchanger malware. But the bureau dropped the ball on getting the word out.
The Committee on Oversight and Government Reform posted the bill on its Madison website to let people view the bill before it is formally introduced.
The hacker group LulzSec is promising more activity, despite the arrests of six active members earlier this month. In a message posted to YouTube, the group said it would start to take hacking action against governments, corporations and agencies beginning April 1.