The codes are a known tool for delivering malware, but a recent experiment showed that security pros will risk a scan for an iPad.
The movie that inspired a lot of people to become government techies might have been real, just a little.
Dell, HP and IBM are getting nipped at by smaller competitors and an emerging trend toward custom hardware.
Research at Fortinet confirms that old vulnerabilities are the most exploited. You might want to consider replacing XP with Windows 8, or at least 7.
Axwat MailGate combines security and policy enforcement for sharing files via the cloud.
ThinkPad X1 Ultrabook combines speed, performance and security with a rugged design.
Data mining, analytics and Web dashboards can help fill gaps in education by letting educators study how students learn, a Brookings report says.
The new OS provides an easy connection to Xbox Live, though that might not be popular with network admins.
Known vulnerabilities provide the most frequently attacked targets in commonly used software. NIST offers updated guidance for handling this crucial and challenging chore.
The Government Accountability Office recently released a report that assessed the progress seven agencies have made in implementing the Cloud First policy and came up with their seven top challenges.
A different kind of networking switch that turned up in Iowa has been returned to Google — with no questions answered.
National security and emergency preparedness can be shifted safely to the cloud, experts say, provided agencies pay proper attention to details.
The re-released rugged laptop includes has a faster chipset, expanded storage and an innovative light sensor.
Symantec says the well-funded hackers behind the 2009 Google attacks are still very active in gathering intelligence, while an NSA official says nations are getting "reckless" with their attacks.
The long-standing deadlock on government spectrum and cybersecurity policies could use input from some serious deal-makers.