Government - Page 77.5
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The report, from the General Accounting Office, the non-partisan investigative arm of Congress, gave the federal government a grade of D- for the way it places "a broad array of federal operations and assets at risk of fraud, misuse and disruption." . . .
Can the public trust the government to limit its use of the system to capturing spies, hackers and terrorists while protecting the privacy of law-abiding Americans? Or should that trust be given to another party that would administer the online taps? . . .
Wow. I'm sure this isn't the last of it. "A federal judge on Wednesday found that MP3.com willfully violated the copyrights of Universal Music Group, and ordered the Internet music sharing company to pay Universal $25,000 per compact disc, or as much as $250 million.. . .
Criminals who perpetrate crimes using the latest gizmos and Internet technology could soon outfox authorities unless law enforcement agencies act quickly to control and contain cybercrime, the U.S. Justice Department said Thursday.. . .
For a $1,495 membership fee plus $149 a month, Le Club Prive offered investors a chance to earn commissions by recruiting new members to the club, the Securities and Exchange Commission said in its civil suit filed in federal court in . . .
The lawmaker who, with his periodic report cards, shamed federal agencies into taking steps to rid their most critical computer systems of the Year 2000 computer bug plans to shed the same light on the government's computer security practices. Rep. Stephen . . .
The Web has forever changed the way governments at all levels interact with one another and with the citizens they serve. Widespread Internet access is expected to completely alter people's ability to tap into government resources in the next few years . . .
Two New Jersey agencies are calling for the state to strengthen its computer crime laws, enhance law enforcement training, and beef up education programs to combat computer-related crime. Concerned about the proliferation of child sexual abuse, fraud, identity theft, hacking, cyberstalking, . . .
US Attorney General Janet Reno said on Wednesday that details for a planned review of the FBI computer program designed to capture email messages for criminal investigations will be released on Thursday. . . .
Linux does not meet the Defense Information Infrastructure's Common Operating Environment Kernel Platform Compliance requirements for a Posix-compliant application programming interface, Posix-compliant commands and utilities, the Motif X Window System interface, the Common Desktop Environment and Network File System sockets. . . .
Rep. Tom Davis, R-Va., thinks the government also needs a privacy czar who would coordinate information protection among federal agencies. Many of those agencies have chief information officers who are responsible for privacy issues - but that's in addition to a . . .
Fighting cybercrime is complex and time-consuming. One case can involve a multitude of computer systems, networks, and administrators, and requires the cooperation of all system owners, and sometimes many nations, in order to find the perpetrator. Due to their love of . . .
It's time for the federal government to sound a security alert -- of a different sort.
The government has certified CygnaCom Solutions Inc.'s Security Evaluation Laboratory to test information security software to assure users that security products perform the functions that vendors claim.
IN WHAT SOME observers see as a significant ruling for the future of the Internet, a U.S. federal judge Thursday issued a permanent injunction barring an online hacker publication from linking to Web sites where visitors can download illegal code, such . . .
Oscar S. Cisneros writes: "Privacy groups are cheering a federal appeals court decision that promises to curb the ability of law enforcement agencies to get access to Internet-style communications. The decision also reins in the hungry maw of the government's Carnivore . . .
The FBI has 3,000 pages of documents about its ``Carnivore'' e-mail surveillance system and expects to begin releasing some to the public in about 45 days, the Justice Department said Wednesday. Additional releases should follow every 45 days until all the . . .
The Federal Court of Appeals for the District of Columbia ruled yesterday that law enforcement agents seeking to intercept data packets that combine addressing information and the content of communications must meet the higher legal requirements needed for a search warrant. . . .
An electronic balloting service stopped 35 attempts to hack into the Reform Party's presidential nomination process in another successful step toward online voting, eBallot.net Inc. officials said.
RCMP are working with the FBI to track down computer hackers who overloaded an Edmonton-based Internet service provider yesterday, denying access to some customers. Edmonton RCMP found the "denial of service" attack on OA Group Inc.'s server that barred subscribers . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.