Floods tend to create all kinds of dangers in their path, including some you wouldn't expect, like the giant whirling water vortex recently spotted in Lake Texoma.
Since 1980, the Army has depended on the Abrams for battlefield superiority in combat. As part of Road Trip 2013, CNET's Daniel Terdiman checked out how these battle-tested vehicles are forged.
Security researcher hired by New York Times says an "overwhelming percentage" of hacks originate from a 12-story building in Shanghai associated with the Chinese military.
The "party game for horrible people" will use proceeds from its latest expansion pack to do something not quite so horrible.
A funny thing happened as the jurors walked to the courtroom. One juror changed his vote, throwing the whole verdict into disarray.
From fabric keyboards to kit that powers up when the soldier mounts up, Intelligent Textiles is one of the companies on the front line of wearable technology.
A new report from the Intelligence and Security Committee in the British Parliament questions the procedures and protocols used that allowed the Chinese telecom-gear maker to expand its operations in that country.
New legislation to be introduced by the House Intelligence Committee aims to curb cybertheft and cyberespionage done by "cyber hackers from nation-states like China and Russia."
The talks will focus on the theft of U.S. intellectual property and will kick off as part of the yearly "Strategic and Economic Dialogue" between China and the U.S., The New York Times reports.
More than two dozen advanced weapons systems are said to have been accessed. Documents obtained by the Washington Post do not indicate whether the breaches occurred on government or contractor networks.