Tests show that drones guided by the system can detect and avoid other aircraft, which will allow unmanned training flights any time day or night.
The information-stealing Trojan attacks the recently discovered flaw in XML Core Services, as well as Flash Player, and might be coming from China.
Building an app store can be the best way to make sure employees are using the right mobile apps. Here's a checklist to help you get there.
The controversial bill has been amended to protect civil liberties, but fails to win over critics who see it as an expansion of military authority and a threat to personal privacy.
Technique ionizes the air around the Laser-Induced Plasma Channel, allowing it to target anything that conducts electricity better than the ground it's sitting on.
A research team shows DHS and FAA how spoofing unencrypted GPS signals lets them take over drones in flight, potentially turning them into weapons.
The experimental technology could break new ground in satellite communications, terrestrial links and even fiber optics.
A focus on streamlining systems and delivering constituent services can help agency initiatives succeed in rocky times, a company executive says.
The Army's future IT savings will come from eliminating duplicate apps and moving the rest to another environment, says Col. Chris Miller.
The spyware, reportedly a U.S. cyber weapon targeting Iran, was being actively updated as recently as March and apparently was directed by an individual rather than being automated, according to Bit9 research.
As defense agencies embrace cloud computing, many are finding that cloud solutions deemed good enough for consumers can't handle their unique requirements.
An agency pilot program pursues data provenance, which seeks to trace the origins, accuracy and life cycle of the data NSA collects.