To hackers, government users are phish in a barrel
Attacks against government systems rose again in 2011, and phishing campaigns were by far the most common source of security incidents, according to US-CERT.
Attacks against government systems rose again in 2011, and phishing campaigns were by far the most common source of security incidents, according to US-CERT.
A class-action lawsuit filed in an Austin, Texas, court the week of March 12 alleges some of the most-downloaded mobile apps are stealing personal information without users' knowledge. Just who is responsible? There are some pretty well known names, in...
When we give up ownership of information and resources in favor of anywhere, any-device access, we risk trading down on security in the process.
More than two years after the deadline for deploying DNS Security Extensions in .gov domains, fewer than 60 percent of agencies have digitally signed DNS records to enable the security tool.
The rapid global growth of satellite operators is causing substantial interference problems, experts say.
Join a live webcast of the Convergence 2012 keynote presentation Monday, March 19, at 9 a.m. CDT.
With the spread of mobile devices and apps, the personal cloud will replace the personal computer at the center of users' digital lives, according to a report from Gartner.
The association has launched a new membership group to help technology companies take advantage of the evolving federal investment in cloud-related technologies.
The Information Assurance Scholarship Program provides full rides for graduate and undergraduate students, and military and civilian DOD employees, in exchange for commitments to stay with DOD.
Code Red and Nimda survive the second bracket of the Malware Madness 2012 tournament. Voting is on for the next round.