Government - Page 77.25
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Federal chief information officers are concerned that hackers will gain control of federal computers and damage Web sites or hurt the systems of other agencies, according to a new survey. The survey, conducted by the System Administration, Networking, and Security (SANS) . . .
Nearly four weeks after Judge Lewis Kaplan ruled in favor of the movie industry, ordering a hacker Web site not to post or link to DeCSS, copies of the DVD-decrytping code abound. There are offshore DeCSS posters and anonymous types running . . .
On Oct. 1, the Electronic Signatures in Global and National Commerce Act, or E-Sign, will take effect, giving electronic signatures the same legal standing as their paper-and-pen counterparts. This expansive federal legislation considers facsimiles of an original signature and recorded agreements . . .
Linux is up against some stern arguments against its use in secure government computing--arguments open source security experts are happily blowing apart. The open source development method itself came under fire in a recent article in Government Computer News titled "Linux . . .
The government's computer systems remain "fraught with weaknesses," posing security risks at a host of federal offices, including the Defense and Treasury departments, a report released Monday found. The report, prepared for Congress by the General Accounting Office, said that . . .
The report, from the General Accounting Office, the non-partisan investigative arm of Congress, gave the federal government a grade of D- for the way it places "a broad array of federal operations and assets at risk of fraud, misuse and disruption." . . .
Can the public trust the government to limit its use of the system to capturing spies, hackers and terrorists while protecting the privacy of law-abiding Americans? Or should that trust be given to another party that would administer the online taps? . . .
Wow. I'm sure this isn't the last of it. "A federal judge on Wednesday found that MP3.com willfully violated the copyrights of Universal Music Group, and ordered the Internet music sharing company to pay Universal $25,000 per compact disc, or as much as $250 million.. . .
Criminals who perpetrate crimes using the latest gizmos and Internet technology could soon outfox authorities unless law enforcement agencies act quickly to control and contain cybercrime, the U.S. Justice Department said Thursday.. . .
For a $1,495 membership fee plus $149 a month, Le Club Prive offered investors a chance to earn commissions by recruiting new members to the club, the Securities and Exchange Commission said in its civil suit filed in federal court in . . .
The lawmaker who, with his periodic report cards, shamed federal agencies into taking steps to rid their most critical computer systems of the Year 2000 computer bug plans to shed the same light on the government's computer security practices. Rep. Stephen . . .
The Web has forever changed the way governments at all levels interact with one another and with the citizens they serve. Widespread Internet access is expected to completely alter people's ability to tap into government resources in the next few years . . .
Two New Jersey agencies are calling for the state to strengthen its computer crime laws, enhance law enforcement training, and beef up education programs to combat computer-related crime. Concerned about the proliferation of child sexual abuse, fraud, identity theft, hacking, cyberstalking, . . .
US Attorney General Janet Reno said on Wednesday that details for a planned review of the FBI computer program designed to capture email messages for criminal investigations will be released on Thursday. . . .
Linux does not meet the Defense Information Infrastructure's Common Operating Environment Kernel Platform Compliance requirements for a Posix-compliant application programming interface, Posix-compliant commands and utilities, the Motif X Window System interface, the Common Desktop Environment and Network File System sockets. . . .
Rep. Tom Davis, R-Va., thinks the government also needs a privacy czar who would coordinate information protection among federal agencies. Many of those agencies have chief information officers who are responsible for privacy issues - but that's in addition to a . . .
Fighting cybercrime is complex and time-consuming. One case can involve a multitude of computer systems, networks, and administrators, and requires the cooperation of all system owners, and sometimes many nations, in order to find the perpetrator. Due to their love of . . .
It's time for the federal government to sound a security alert -- of a different sort.
The government has certified CygnaCom Solutions Inc.'s Security Evaluation Laboratory to test information security software to assure users that security products perform the functions that vendors claim.
IN WHAT SOME observers see as a significant ruling for the future of the Internet, a U.S. federal judge Thursday issued a permanent injunction barring an online hacker publication from linking to Web sites where visitors can download illegal code, such . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.