Government - Page 77.75
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The lawmaker who, with his periodic report cards, shamed federal agencies into taking steps to rid their most critical computer systems of the Year 2000 computer bug plans to shed the same light on the government's computer security practices. Rep. Stephen . . .
The Web has forever changed the way governments at all levels interact with one another and with the citizens they serve. Widespread Internet access is expected to completely alter people's ability to tap into government resources in the next few years . . .
Two New Jersey agencies are calling for the state to strengthen its computer crime laws, enhance law enforcement training, and beef up education programs to combat computer-related crime. Concerned about the proliferation of child sexual abuse, fraud, identity theft, hacking, cyberstalking, . . .
US Attorney General Janet Reno said on Wednesday that details for a planned review of the FBI computer program designed to capture email messages for criminal investigations will be released on Thursday. . . .
Linux does not meet the Defense Information Infrastructure's Common Operating Environment Kernel Platform Compliance requirements for a Posix-compliant application programming interface, Posix-compliant commands and utilities, the Motif X Window System interface, the Common Desktop Environment and Network File System sockets. . . .
Rep. Tom Davis, R-Va., thinks the government also needs a privacy czar who would coordinate information protection among federal agencies. Many of those agencies have chief information officers who are responsible for privacy issues - but that's in addition to a . . .
Fighting cybercrime is complex and time-consuming. One case can involve a multitude of computer systems, networks, and administrators, and requires the cooperation of all system owners, and sometimes many nations, in order to find the perpetrator. Due to their love of . . .
It's time for the federal government to sound a security alert -- of a different sort.
The government has certified CygnaCom Solutions Inc.'s Security Evaluation Laboratory to test information security software to assure users that security products perform the functions that vendors claim.
IN WHAT SOME observers see as a significant ruling for the future of the Internet, a U.S. federal judge Thursday issued a permanent injunction barring an online hacker publication from linking to Web sites where visitors can download illegal code, such . . .
Oscar S. Cisneros writes: "Privacy groups are cheering a federal appeals court decision that promises to curb the ability of law enforcement agencies to get access to Internet-style communications. The decision also reins in the hungry maw of the government's Carnivore . . .
The FBI has 3,000 pages of documents about its ``Carnivore'' e-mail surveillance system and expects to begin releasing some to the public in about 45 days, the Justice Department said Wednesday. Additional releases should follow every 45 days until all the . . .
The Federal Court of Appeals for the District of Columbia ruled yesterday that law enforcement agents seeking to intercept data packets that combine addressing information and the content of communications must meet the higher legal requirements needed for a search warrant. . . .
An electronic balloting service stopped 35 attempts to hack into the Reform Party's presidential nomination process in another successful step toward online voting, eBallot.net Inc. officials said.
RCMP are working with the FBI to track down computer hackers who overloaded an Edmonton-based Internet service provider yesterday, denying access to some customers. Edmonton RCMP found the "denial of service" attack on OA Group Inc.'s server that barred subscribers . . .
Under pressure from Congress to better coordinate the government's response to computer viruses and other cyberattacks, the National Security Council has developed a plan outlining roles and responsibilities for federal cybersecurity organizations.
Oscar S. Cisneros writes: "A new government-approved standard for telecommunications equipment violates the Fourth Amendment's prohibition against unreasonable searches and seizures, critics say. The standard, released in updated form last week by the Telecommunication Industry Association, instructs telecommunications hardware manufacturers on . . .
A report to be published this year by one of the nation's top educators in information systems and security warns that the current system of higher education cannot support the demand for information assurance professionals and calls for a revolutionary change . . .
As unlikely as it may sound, lawyers and computer security experts agree on one thing: When it comes to determining what's legal and what's not on the information superhighway, there are more questions than answers. And the shortage of clear-cut legal . . .
Do you think there should be network security standards set by the government? According to MSNBC "insurance companies and the security industry are considering quasi-government regulation to try to compel Internet firms to take basic security steps." This was . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.