The basics are the same: A uniform, a helmet, boots, a rucksack, and a rifle. But that's about the only similarities between what a D-Day soldier and one in Afghanistan took into combat.
Security researcher hired by New York Times says an "overwhelming percentage" of hacks originate from a 12-story building in Shanghai associated with the Chinese military.
Since 1978, the Army has depended on this proven vehicle, a 70-ton tank with a 120mm gun. CNET's Daniel Terdiman went to Lima, Ohio on Road Trip 2013 to see how the combat vehicle is made.
Soldiers will use Android and Windows systems during missions in a not-so-distant future. The Raytheon Company has developed a wearable device and display to help pilots navigate and see where their foes are even after they leave the cockpit.
The hacker group gets administrator privileges for Twitter's domain name record and also appears involved in a New York Times' Web site outage.
Future weapon would seek out targets that conduct electricity better than the air or ground that surrounds them.
A new report from the Intelligence and Security Committee in the British Parliament questions the procedures and protocols used that allowed the Chinese telecom-gear maker to expand its operations in that country.
New legislation to be introduced by the House Intelligence Committee aims to curb cybertheft and cyberespionage done by "cyber hackers from nation-states like China and Russia."
The talks will focus on the theft of U.S. intellectual property and will kick off as part of the yearly "Strategic and Economic Dialogue" between China and the U.S., The New York Times reports.
More than two dozen advanced weapons systems are said to have been accessed. Documents obtained by the Washington Post do not indicate whether the breaches occurred on government or contractor networks.