In a move to control the contollers, criminal servers have been swapped for government servers to intercept communications between infected systems and the servers controlling them.
The United States is still \"hugely vulnerable\" to cyber attacks, but so are most other nations, a former chairman of the Joint Chiefs of Staff said Monday.
The Air Traffic Organization is in the middle of one of the largest pilots in government testing mobile computing devices. ATO CIO Steve Cooper said business organizations must have a valid need to use the devices. Cooper said ATO will test other mobile devices this spring.
Cyber-attackers could view a shutdown as the perfect opportunity to infiltrate government systems. ISC squared\'s Hord Tipton joins us with analysis.
IBM\'s report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. We get details from IBM\'s Kris Lovejoy.
Microsoft makes court documents public as part of battle to provide cloud services to the Interior Department. Google contends its Google Apps for Government offers more security than FISMA requires.
Sen. Sheldon Whitehouse (D-R.I.), who led a Senate Intelligence Committee review of cybersecurity policy last year, said he is hopeful that Congress will be able to pass an overhaul of cyber laws this year. Whitehouse has been critical of the pace at which the Obama Administration has moved to propose such changes to lawmakers.
A hacker convicted of stealing credit and debit card numbers says the Secret Service authorized his criminal activity.
Every agency is in search of good leaders and good managers. But it is important to recognize the distinction.
DHSers who perform cybersecurity functions would not be furloughed during a government shutdown, including contractors.
The federal government\'s list of emergency network security personnel has not been updated in 15 years.
The Pentagon moves to tighten cybersecurity for troops in Afghanistan and Iraq.
The best defense against cyber attacks is not a new weapon system but strict human security procedures,
The hack last month that compromised RSA\'s SecurID product resulted from a targeted advanced persistent threat that took advantage of a zero-day vulnerability in the Adobe Flash Player, the company confirmed.
Security experts are warning users to be on the watch for targeted email attacks after a breach at a major marketing firm that may have put millions of addresses in the hands of hackers and scammers.