Cybersecurity

Any Word on Zeus?

Earlier this year, the <a href="http://krebsonsecurity.com/2010/02/zeus-attack-spoofs-nsa-targets-gov-and-mil/">Zeus</a> banking Trojan infected hundreds of computers within the federal government leaving experts no choice but to prepare for a mass attack. The then e-mail campaign was designed to steal passwords, but at the time was only sent to government and military e-mail addresses.

Cybersecurity

More on Cyberwar

The debate about what constitutes a cyberwar still rages on. The latest installment comes from a conference put on by cybersecurity vendor ArcSight in National Harbor, Md., where Eneken Tikk, head of the legal and policy branch of the Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia, discussed the 2007 attacks on that country's networks.

Cybersecurity

VA gets visibility with cybersecurity tool

Federal Computer Week

Cybersecurity

Canada to U.S.: Step Up

Canada's privacy commissioner took a swipe at her U.S. counterparts on Monday.

Cybersecurity

CIOs are ahead of the curve on improving accountability

Some technology executives already were on the path to enhanced scrutiny of risky projects, before President Obama sent a reminder.

Cybersecurity

TechAmerica: Just Do It

In hopes that Congress will get something of note accomplished before year's end, IT industry association TechAmerica released a statement on Friday encouraging the Senate to pass a vote on several popular cybersecurity reforms before breaking later this month.

Cybersecurity

GSA may recompete HSPD-12 contract

Violations of procurement policies revealed in an IG report could lead to a new competition for a services contract at GSA.

Cybersecurity

VA gets visibility with cybersecurity tool

A VA IT official said a new tool that provides an overview of all computers and IT devices on the department's central network should be operating soon.

Cybersecurity

Strange Facebook Status Updates

Another day, another potential <a href="http://www.facebook.com/">Facebook</a> vulnerability.

Cybersecurity

Nigerian Hackers Sell Man's House

News of a scam in Australia hit the Web on Wednesday, and I have to say it's a doozy. A man allegedly had his home sold by Nigerian-based scammers, and he had no idea what was going on.

Cybersecurity

OPM Seeking Input on Cybersecurity

Cybersecurity

What's the Future of Cyber Spending?

Tim Stevens, a blogger and researcher in the War Studies Department at King's College in London, pondered on Monday at risk the United Kingdom's cybersecurity budget may be in the future given the nation's tight budget and poor economic outlook. Writing for Forbes.com, Stevens says despite the promises to spend more on cybersecurity - "the Tories labeled the U.K. the <a href=http://ubiwar.com/2009/09/25/uk-cyber-strategy-overhaul-needed-say-tories/sick man of cybersecurity</a>," he wrote - the expected £2 billion earmarked for security may fall to financial realities.

Cybersecurity

Don't Tweet Your Password. Duh.

Twitter users report seeing tweets claiming if a user types his or her password into the live feed, twitter will automatically obfuscate it. These posters claim to have entered in their passwords to demonstrate, and allegedly all asterisks appeared when the tweet went live. If you've seen this tweet please ignore it, it's not true. The tweet is just a ploy/gimmick/joke to get people to post their passwords. Here's <a href="http://bash.org/?244321">an example</a> of this kind of nonsense.

Cybersecurity

DOD, DHS earn failing grades in foreign language

The Defense and Homeland Security departments don't have enough specialists who are fluent in Middle Eastern and Asian foreign languages. Can technology help bridge the gap?

Cybersecurity

Cyber partnership still eludes government and industry

Industry doesn't want to risk trade secrets, and government likes to classify critical information. No wonder cyber threats get less concerted attention than they deserve.

Cybersecurity

NIST to help retrain NASA employees as cyber specialists

Cybersecurity research institute would prepare laid-off workers to fill the tens of thousands of technicians the federal government needs.

Cybersecurity

Malware Toolkit

Antivirus is no guarantee of a clean, well functioning computer. There are times IT professionals need to manually clean their machines. As such, a topic of conversation for a computer advisory board I read regularly has been on toolkits for infected workstations. The toolkit addresses removing malware from these infected workstations. One member suggested the below steps, those of which seemed like a reasonable approach:

Cybersecurity

Now That's Ironic

Oh the irony: According to a report released Thursday by the DHS inspector general, the very system used by the U.S. Computer Emergency Readiness Team to exchange and access mission-critical data about the security posture of civilian networks was vulnerable to attack.

Cybersecurity

Fed's cybersecurity watchdog found to have security issues

The U.S. Computer Emergency Readiness Team had 540 vulnerabilities that put its systems at risk, IG says.

Cybersecurity

Soundbytes: Immigration, hiring and the VA claims system

A weekly roundup of comments from Nextgov.com. All comments are presented in their original, unedited form.