Hidden Lynx, a sophisticated group of professional hackers located in China, has carried out high-profile attacks on government, IT contractors and other industries at least since 2009, Symantec says.
Unisys has high hopes for government uses of the software tool that controls who sees what on a network.
NIST updated its guidance for deploying a secure Domain Name System in government enterprises to ensure the availability and integrity of critical DNS data.
LynuxWorks' system, called RDS5201, is an appliance capable of detecting low-level, zero-day rootkits in real time.
The NSTIC programs, which received more than $7 million in grants, range from military, civilian and commercial authentication initiatives to one aimed at protecting children’s privacy online.
This week's Biometric Consortium Conference showcases a wide range of hardware and software solutions for personal identification/authentication applications in government.
The agency is advising against using an elliptic curve algorithm adopted in 2006 that has concerned cryptographers from the beginning.
CyanLine's Fast Disk Acquisition System gives forensics teams a real-time preview of what's on a drive, including whether it's set to prevent copying.
The look-alike Web pages may be created by interest groups, private insurance companies and, sometimes, scammers looking to gather personal information.
The latest revision of FIPS 201, which sets the requirements for PIV cards, includes credentials for mobile devices and new interfaces to enable access with contactless connections.
Public concern over possible tampering by the NSA has led NIST to reopen the comment period on a suite of publications, but the IT security community isn't worried.
If opened to app developers, Apple's Touch ID could give another authentication option to agencies looking to manage mobile devices, especially if other smartphone manufacturers follow suit.