The malware was originally written for Linux nearly ten years ago, but hackers are recompiling the code to make it run on Mac OS X.
Tom Harper, the lab\'s CIO, said the national laboratory created an infrastructure-on-demand platform for easy provisioning of cloud services. He said Los Alamos also introduced WiFi earlier this year for access to its unclassified network.
A Congressional report points the finger at the Chinese military for a hack attack that happened between 2007 and 2008. The tampering originated from a ground station in Norway but had all the telltale tactics of a Chinese attack, the report says.
The SANS Institute has awarded Los Alamos the 2011 U.S. National Cybersecurity Innovation Award for cloud computing security. The lab was the victim of a serious security breach in 1999.
The department released a request for information for 11 email and collaboration services in the cloud. The RFI comes after Onix and Google dropped its protest of Interior\'s award to Softchoice and Microsoft for cloud email in October 2010.
Col. Steve Zotti, the chief of staff for Marine Forces Cyber Command, the Federal Drive with Tom Temin and Amy Morris that cyberspace links together nearly all the other domains.
The Stuxnet worm doesn\'t have a twin after all. Last month Symantec discovered a malware threat with such strong similarities to Stuxnet they called it the Son of Stuxnet.
STRATFOR Vice President of Intelligence Fred Burton joins host Derrick Dortch on today\'s show. October 28, 2011
Bloomberg BusinessWeek reports the United States is blaming China for two hacking attacks in 2007 and 2008.
GSA\'s Dave McClure said a flood of documents will come as soon as OMB signs off on the cloud security guidance. McClure said among the documents will be the application for third party companies to become FedRAMP accreditors of cloud products and services.
The NIST Framework and Roadmap for Smart Grid Interoperability Standards 2.0 builds upon the first cyber outline the agency released.
Deputy secretaries now get quarterly scorecards on how their agency is meeting four IT security priorities, including continuous monitoring of agency networks and secure identity cards. Howard Schmidt, the White House cyber coordinator, said the goal is to increase accountability and make sure agencies are putting enough focus on these areas. Schmidt said he is also developing priorities for 2012, which includes getting cybersecurity legislation passed.
Dan Mintz, former Transportation Department CIO, found much to like in Steven VanRoekel\'s first major speech.
Federal CIO Steven VanRoekel wants the government to move toward a share-first policy where agencies share IT before buying new. He also introduced his \"Future First\" initiative to standardize technology development and adoption across the government. This was VanRoekel\'s first major policy speech since taking over as CIO in August.
For a progress report on how the military is combating the cyber threat and a look at the near term future, officials from the Army, Navy and Air Force cyber commands joined the Federal Drive with Tom Temin and Amy Morris for a special Federal News Radio panel discussion.