NIST issues guide to fixing the holes in Bluetooth
The updated special publication offers guidance on countering threats to devices using Bluetooth, some versions of which provide only limited security.
The updated special publication offers guidance on countering threats to devices using Bluetooth, some versions of which provide only limited security.
The vulnerability in XML Core Service, being actively exploited, affects all supported versions of Windows and Office 2003 and 2007.
The new portfolio lets organizations test and manage security for mobile apps across the software development life cycle.
Using Amazon Web Services for cloud-based enterprise infrastructure has improved service to the agency and the public, CIO Linda Cureton says.
A new family of network communications and data networking services will allow agencies to quickly upgrade and manage new applications and capabilities.
Satya Nadella
Twenty years ago at Microsoft’s first annual TechEd conference, we gathered to talk about the industry transformation from mainframe to minis to client/server computing. The vehicle for that transformation was the Windows oper...
CSC will handle the transition, which aims to give the workforces secure access to enterprise apps from virtually any device.
Kaspersky Lab says an early Stuxnet version used code from Flame; separate research reveals "world-class" crypto behind Flame's attack.
It only comes once a year, but here is your Weekend Reading: The E3 Edition – bringing you all the highlights from the Los Angeles entertainment expo. We’ve also got stories on the limited edition Nokia Lumia 900 “Batphone”, the...
DOE's National Nuclear Security Administration is utilizing cloud-based social networking tools to allow the NNSA’s workforce to collaborate and perform their tasks from any device, at any time.