Wei Chen, while serving as a U.S. defense contractor, allegedly plugged a personal thumb drive into computers connected to classified and unclassified networks, against protocols.
Information about the military's joint tactical communications system has been stolen by unidentified hackers.
In Open Sourcing its artificial intelligence engine - freely sharing one of its most important creations with the rest of the Internet - Google showed how the world of computer software is changing.
IBM recently announced its TrueNorth chip, which operates like a brain does. Here are the details of the chip and how IBM sees it changing the future of computing.
Rethinking conventional computer designs, which are decades old, the U.S. Department of Energy has set its sights on creating systems that could supplant today's PCs and servers.
For practical application, a particular class of quantum computers, the so-called adiabatic quantum computer, has recently generated a lot of interest among researchers and industry. It is designed to solve real-world optimization problems conventional computers are not able to tackle.
"Spooky action at a distance," Einstein's famous, dismissive characterization of quantum entanglement, has long been established as a physical phenomenon, and researchers are keen to develop practical applications for entanglement including communication, encryption, and computing.
A group of hackers claims to have breached an FBI information-sharing portal and gained access to numerous sensitive systems, including records of individuals who have been arrested by U.S. federal agencies as well as tools for sharing information between U.S. federal agencies and partners located both domestically and abroad.
Capitol Hill is increasingly concerned about the lack of international laws governing cyber war.
Cisco has released software updates to address a series of critical and high severity vulnerabilities affecting some of the company's security and wireless appliances.