phishing

How to button up a cybersecurity risk on every computer in the government

Often attachments with malicious payloads come in the popular Adobe PDF format. Recently, the National Security Agency issued guidance for how to configure…

Read more
(AP Photo/Patrick Semansky)FILE - In this May 6, 2020, file photo, a sign stands outside the Department of Labor's headquarters in Washington. A government watchdog has found that the Labor Department’s widely watched weekly unemployment benefits data are providing an inaccurate reading on the number of newly laid off workers because of flaws in the government’s data collection. (AP Photo/Patrick Semansky, File)

Think you understand phishing attacks? Wait ’til you hear this

Read more
Amelia Brust/Federal News Network

Foreign hackers up their game, your agency may not be prepared

Read more
Amelia Brust/Federal News NetworkCDM

Mitigating the threat of ransomware, FHFA uses all the tools at their disposal

Read more
Getty Images/iStockphoto/Pixtumglobal, globe, abstract, world map, map, traffic, banwidth, transport, shipping, worldwide, access, data, digital, communication, telecoms, network, networking, loading, sending, design, tech, hi tech, technology, sci fi, line, linear, connection, point, geometric, flare, hexagons, circuit, electric, electronic, microchip, pattern, concept, vector, illustration, space, composition, blue, power, energy, spark, movement, motion

How to keep your communications truly private when everyone is remote

Read more

Alexander Garcia-Tobar: Is your agency DMARC compliant?

The Domain-Based Message Authentication, Reporting and Conformance standard (DMARC) is designed to lower the risk of phishing attacks.

Read more

Feds more at risk from clicking on links than from data stolen during OPM breach

Bill Evanina, the director of the National Counterintelligence and Security Center and the National Counterintelligence Executive, said foreign hackers…

Read more

Fighting the ‘cyber caliphate’s’ social media addiction

A phenomenon called the “cyber caliphate” is producing ever-rising levels of cyber-attacks and real-world violence. ICIT’s James Scott has advice for how agencies can defend against and attack cyber-jihadists.

Read more