New Android malware designed to sneak into networks
The Trojan doesn't seem to hurt Android devices but is clearly designed to get inside private networks, which is a concern for BYOD programs.
The Trojan doesn't seem to hurt Android devices but is clearly designed to get inside private networks, which is a concern for BYOD programs.
ICANN has begun notifying 105 applicants who paid $185,000 each to apply for new generic TLDs that some of their information was exposed through a glitch on the online application system, which has been offline for three weeks.
IT officials from Europe, Asia and North America will discuss views on the potential for cloud technology to transform public services.
In moving to a virtual data center, Madison County, Ind., found that security in a virtual world can be at least as good as in a physical environment.
In this edition of The Midweek Download, we’ve got stories on changes and improvements in the Windows Phone Marketplace, Kinect and Kinect SDK winning the Design of the Year award and a new blog for Windows 8 app developers.
Changes and improveme...
Current international collaboration against online criminals could offer a template for broader cooperation on cybersecurity, although law enforcement has challenges of its own.
Agencies should only deal with what they can tolerate as a risk, the U.S. Postal Service's Chuck McGann tells a FedScoop audience.
An artist finds that the same approach used in World War I to confound the rangefinders on attacking ships will prevent a facial scanner from recognizing you.
Criminals continue to exploit old vulnerabilities as enterprises, and users fail to keep up with the flood of security updates, the latest Symantec report states.
IBM's new line of products is designed as an integrated package from the beginning, which is intended to eliminate time and money wasted on operations and maintenance.