The NIST architecture is designed to accelerate the adoption of cloud computing.
The attack used a false certificate to trick iCloud users into handing over personal data and login credentials. With an attack of this size, some experts and researchers believe the Chinese government could be to blame.
The groups shared comments on V2V communications with the National Highway Traffic Safety Administration.
Researchers have indicated that a recently patched integer overflow in Adobe Flash Player has been added to exploit kits.
Military, governments and media from around the world are targets in a campaign identified by Trend Micro.
It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.