Kaspersky Lab says an early Stuxnet version used code from Flame; separate research reveals "world-class" crypto behind Flame's attack.
Saying that the window of opportunity to pass critical legislation is quickly disappearing, seven former Pentagon, Homeland Security and intelligence officials urged Senate leaders to bring cybersecurity legislation to the floor.
FAA regulations, including a requirement that UAS operators maintain a visual line of sight with the aircraft, are slowing scientific uses of technology, say developers.
As a part of its broader mobile device efforts, the Army has begun training efforts to teach soldiers how to write their own apps and then make them available for download.
Confirmation that the United States was behind the Stuxnet attack on Iran sheds light on the broadening pattern of international cyber espionage and renews questions about the country's own cyber defenses.
The recently identified Flamer malware appears to be the first to use Bluetooth as a tool for keeping tabs on its victims, researchers say.
The agency is building the architecture for the Defense Department's mobile network and expects to have it at least partly up and running by the end of the year.
Reported new policy comes after a recent hack showed the potential vulnerabilities in sites with user-generated content.
A DOD desktop-based tool that lets users set up and join meetings on the go is available as a mobile app for Android smart phones and tablets.
Imperva's reconstruction of the MilitarySingles hack shows the inherent risks of user-generated content and asks if government needs a "higher standard" for social networking.
The new Joint Cyber Center includes members from the intelligence, operations, and command and control divisions, and a team from the U.S. Cyber Command.
The Defense Department has launched a number of mobile device programs, but the devil is in the details when it comes to deploying handhelds past the wire.