{"id":513,"date":"2004-01-28T00:00:00","date_gmt":"2004-01-28T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/28\/us-government-virus-alert-program-debuts\/"},"modified":"2021-12-30T11:37:31","modified_gmt":"2021-12-30T11:37:31","slug":"us-government-virus-alert-program-debuts","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/28\/us-government-virus-alert-program-debuts\/","title":{"rendered":"US Government Virus Alert Program Debuts"},"content":{"rendered":"<p>Two days after the MyDoom worm began its attack on the Internet, the U.S. government launched a new program to issue e-mail security alerts to the public for virus and worm attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Launched Wednesday by the National Cyber Security Division of the Department of Homeland Security, the alerts will be available to members of the public as well as technology professionals responsible for the security of infrastructure systems.<\/p>\n<p>Interested parties can subscribe to the alerts online: [url=http:\/\/www.us-cert.gov\/]http:\/\/www.us-cert.gov\/[\/url]<\/p>\n<p>Amit Yoran, director of the National Cyber Security Division, said each computer connected to the Internet is a point of vulnerability in the spread of malicious attacks.  Individual computer users who don&#8217;t patch vulnerabilities in their systems, keep antivirus definitions up-to-date or take precautions when opening e-mail attachments are the biggest contributors to the spread of viruses and worms.<\/p>\n<p>The alerts will include announcements about current attacks as well as information for users about how to protect their systems before attacks occur.  The alerts also will provide background information about computer scams and other fraud that may occur online.  In addition, the department will provide security bulletins containing vulnerability announcements, patches and work-arounds to security professionals in charge of computer networks to help them protect national infrastructure and e-commerce systems.<\/p>\n<p>Yoran said the alerts will be digitally signed by the department so users can distinguish them from fake alerts that attackers might send out with virus attachments.  <\/p>\n<p>One of the main parties providing information is the Computer Emergency Readiness Team, or CERT, at Carnegie Mellon University.<\/p>\n<p>More info: [url=http:\/\/www.wired.com\/news\/business\/0,1367,62078,00.html?tw=rss.TOP]http:\/\/www.wired.com\/news\/business\/0,1367,62078,00.html?tw=rss.TOP[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-513","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=513"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/513\/revisions"}],"predecessor-version":[{"id":3000,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/513\/revisions\/3000"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}