What Einstein termed "spooky action at a distance" has been successfully demonstrated for the first time.
More than two dozen advanced weapons systems are said to have been accessed. Documents obtained by the Washington Post do not indicate whether the breaches occurred on government or contractor networks.
Annual report to Congress alleges a steady campaign of hacking designed to acquire information about the U.S. government's foreign policy and military plans.
Since 1980, the Army has depended on the Abrams for battlefield superiority in combat. As part of Road Trip 2013, CNET's Daniel Terdiman checked out how these battle-tested vehicles are forged.
Eric Xu, one of three rotating CEOs at the Chinese telecom gear maker, made the comments at an analyst conference in response to a question about congressional inquiries into Huawei spying concerns.
Security cameras that watch you, and predict what you'll do next, sound like science fiction. But a team from Carnegie Mellon University says their computerized surveillance software will be capable of "eventually predicting" what you're going to do.
In a 52-page report, the House Intelligence committee raises concerns about the two Chinese telecommunications gear makers' ability to aid Chinese espionage.
Security researcher hired by New York Times says an "overwhelming percentage" of hacks originate from a 12-story building in Shanghai associated with the Chinese military.
Total usage among U.S. adults is up to 72 percent in May 2013 from 67 percent in December 2012, with more older people signing up.
Apple's share of U.S. smartphone sales hit 42.5 percent for the three months ending in June, a 3.3 point rise from a year ago, says Kantar Worldpanel.