As a part of its broader mobile device efforts, the Army has begun training efforts to teach soldiers how to write their own apps and then make them available for download.
Confirmation that the United States was behind the Stuxnet attack on Iran sheds light on the broadening pattern of international cyber espionage and renews questions about the country's own cyber defenses.
The recently identified Flamer malware appears to be the first to use Bluetooth as a tool for keeping tabs on its victims, researchers say.
The agency is building the architecture for the Defense Department's mobile network and expects to have it at least partly up and running by the end of the year.
Reported new policy comes after a recent hack showed the potential vulnerabilities in sites with user-generated content.
A DOD desktop-based tool that lets users set up and join meetings on the go is available as a mobile app for Android smart phones and tablets.
Imperva's reconstruction of the MilitarySingles hack shows the inherent risks of user-generated content and asks if government needs a "higher standard" for social networking.
The new Joint Cyber Center includes members from the intelligence, operations, and command and control divisions, and a team from the U.S. Cyber Command.
The Defense Department has launched a number of mobile device programs, but the devil is in the details when it comes to deploying handhelds past the wire.
The portal would mimic the look and functionality of the Web, including Twitter, Facebook, YouTube and other sites for scenario-based training.
The Army's new lab at Aberdeen Proving Ground tests and evaluates software and electronics bound for Network Integration Evaluation 12.2.
The MCX will use SAS to perform cluster analyses, which will help it gain better insight into the unique and changing needs of the local population.