Security budgets aren't likely to be plentiful in 2012, but there are things you can do that don't cost much.
The .tk domain of Tokelau, a New Zealand island territory with 1,400 people and no airport or seaport, is a primary channel for phishing e-mails from China.
In a petition to the FCC, the company says GPS device-makers have no right to protection from signal interference because LightSquared, not GPS devices, has a license to use the spectrum.
DOD experts discuss the challenges involved in issuing mobile devices to military and civilian personnel.
Command Web allows commanders to access and share information on the Army's data-rich, high-bandwidth command and control networks.
The U.S. will either do the hard work necessary to establish a strong national cybersecurity defense or get stuck in the doldrums of decline.
We covered a lot of ground in our technology coverage during 2011, but there were two topics that really grabbed readers' attention.
NIST has opened its research funding programs for fiscal 2012, with the IT Lab among nine grant programs that are accepting applications.
Will system-on-a-chip design finally let the company cut in on ARM's territory?
The Maya didn't predict the end of the world, just the end of a calendar. And new technologies even give us reason to look forward to 2012.
The Army is evaluating a Web-based system that gives commanders access to previously unavailable data residing on thick-client applications.
NIST’s new electronic authentication guidelines reflect the growing use of remote devices to access government systems, and could help expand use of PIV cards.
The GCN Lab reviews five of the latest smart-phone and tablet products that would be a good fit for government workers at the office, home and in-between.
The Los Alamos National Lab takes a 'pick-and-choose' approach to securing mobile networks for its large, diverse user base.