'Hit man' phishing scam makes an offer you can refuse
Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.
Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.
The Massachusetts Health Insurance Connector Authority is using LexisNexis identity management software to verify the residency information of people participating in the exchange.
Office of Naval Researchâs ânetwork bridging systemâ moves data instantaneously between the combat system and the command and control network.
Former FBI official Shawn Henry said government understands the need to be more forthcoming with cyber intell, but creating the necessary legislative and policy framework is complex.
Smart meters have an optical port that, if attacked, can let someone change the way they operate, a researcher says at Black Hat.
In January, we shared some thoughts on our approach to developer events, including a commitment to come back with more on our plans for an event this coming fall. Well, here it is: our next developer conference will be this fall, and it's (again) calle...
In this edition of The Midweek Download, we’ve got stories on the graphics platform in Windows 8, a profile of the thin and slick Samsung Series 9 laptop and a great Getting Started Guide for the new Office Preview.
Hardware accelerating everythi...
This year's Black Hat Briefings will tackle OS security â or lack of it â in Windows and iOS. Mobile devices and industrial control systems get a lot of attention, too.
The system integrates DataDirect Networksâ Web Object Scaler cloud storage appliance with YottaStorâs mobile computing and big data storage system called YottaDrive.
Security in the latest version of Microsoftâs operating system beats previous releases by âleaps and bounds,â according to researchers at the Black Hat Briefings.