Zero-day exploit hits Java – should you just turn it off?
The flaw in the ubiquitous programming language is being exploited with the Poison Ivy RAT from servers in China and might not be patched until October.
The flaw in the ubiquitous programming language is being exploited with the Poison Ivy RAT from servers in China and might not be patched until October.
Researchers for the first time use a solid-state quantum processor in prime factoring (and get it right half the time), which could eventually have a big impact on security.
After consolidating its servers CDC's research lab laid the foundation for managing a virtual infrastructure.
County officials are stepping up efforts to transform operations and improve the quality of services to residents while at the same time lower IT management costs.
In this edition of Weekend Reading, we’ve got stories on Bing adding Quora to the social sidebar, Microsoft’s first new logo in 25 years and a snappy new movie app in the Windows Phone Marketplace called Crackle. Don’t miss any of the...
If industrial control systems are running Windows, they're vulnerable to hackers. But can engineers handle that?
As the bad guys turn their attention to mobile devices, the government has begun mapping out security that needs to be incorporated in coming generations of this technology.
Iowa State's Information Assurance Center's test bed simulates complex networks and cyberattacks, making it a trusted source for information on the reliability and effectiveness of security products.
In advance of one of the most significant waves of product launches in Microsoft’s history, today we are unveiling a new logo for the company.
It’s been 25 years since we’ve updated the Microsoft logo and now is the perfect time for ...
The Superior Court of California, County of Riverside is sponsoring the Shared Procurement Services Pilot Project, providing the services of a trial court procurement specialist to the other courts via BidSync, a procurement-as-a-service provider.