A talk on China's military cyber-attack capabilities has been pulled from the Black Hat security conference schedule following pressure from Taiwanese and Chinese agencies.
When it debuts next week, the Apple tablet may support thousands of iPhone applications and a dramatic color display, but it will seem like a 90-pound weakling next to the latest tablet made for the U.S. military by Xplore Technologies.
The U.S. military didn’t encrypt video streams from drone aircraft flying over war zones because soldiers without security clearances needed access to the video, a military security expert says.
A formal Pentagon cyber strategy may define which acts of digital sabotage constitute acts war that warrant conventional military retaliation, but cases clear-cut enough to justify such retaliation may be few and far between, experts say.
For the National Security Agency, America's high-tech spy agency and guru for military information security, inviting the tech media to attend its first-ever NSA Trusted Computing Conference and Exposition was no easy decision.
The National Security Agency, America's high-tech spy agency which also plays a key role in approving hardware and software for use by the Department of Defense, wants to be able to outfit military personnel with commercial smartphones and tablets -- but based on a NSA security design.
It’s not a very good day when a security report concludes: Disruptive cyber activities expected to become the norm in future political and military conflicts. But such was the case today as the Government Accountability Office today took yet another critical look at the US federal security systems and found most of them lacking.
In its new cyberdefense strategy, the Pentagon is drawing on lessons about agility, lifecycle management and supply-chain protection that have already been learned by private corporations.
An alliance of companies promoting embedded Internet Protocol in smart devices, like military sensors and home appliances, has added 12 new member organizations including Intel Corp.
During World War II, Britain's brightest minds routinely decoded encrypted German military messages, an effort believed to have significantly shortened the war and saved the country further devastation.
The U.S. federal government has launched a 10-year, $5 billion program to provide commercial satellite communications services to military and civilian customers.
The main focus of the U.S. Department of Defense's new Cyber Command will be protecting military networks, not engaging in cyberwarfare, the nominee to head the organization said Thursday.
Meet the Firefly. Israeli defense contractor Rafael Armament Development Authority calls it a "revolutionary concept in tactical intelligence," but really it's a wireless camera that's shot 500 feet in the air by a grenade launcher. And if a couple of hackers here at the [<a href="https://www.defcon.org/">Defcon</a>] hacking convention get their way, soon anyone will be able to buy this type of military grade technology for only US$500.
The U.S.-China Economic and Security Review Commission (USCC) has asked for an investigation after hackers posted online a memo purportedly from India's military, which claimed that the country had intercepted emails of USCC officials with the help of Nokia, Research In Motion, and Apple.
The Obama administration is considering a new military cyber command for protecting Department of Defense networks and developing offensive cyber war capabilities, according to a report in the Wall Street Journal.
The federal watchdog agency, the General Accountability Office, went undercover on the Internet to expose manufacturers actively willing to sell bogus military-grade electronics parts used in major weapons and aircraft systems of the U.S. Department of Defense.
The U.S. Army is having a hard time manning its IT staff because it cannot find military personnel with the right networking and IT security qualifications.
Huawei, China's largest telecommunications equipment provider, has for the first time revealed its board of directors along with its overseas sales figures, in a move to further clear its reputation following U.S. concerns that the company is tied to the Chinese military.
As the U.S. Army ponders how to give every soldier a smartphone loaded with apps for military purposes -- and be able to support global communications not only with commercial cellular networks like Sprint, Verizon or AT&T -- it is also exploring how it can quickly set up its own wireless network almost anywhere in the world.
The Enigma cypher machine used by the German military in World War II is still a tough nut to crack today. The total number of ways it can be configured for every letter is around 150 million million million. That's enough to keep it beyond the reach of all but the most determined of brute force attacks.
In the face of astonishingly high unemployment rates among enlisted military personnel returning to post-war life, a nonprofit group is empowering soldiers with social networking savvy to help them transition to the civilian workforce.