Government
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A New York court will today begin hearing the DVD copyright case between Hollywood and the Hacker community, in the shape of 2600.com. Eight studios, members of the Motion Picture Assoiciation of America (MPAA), are suing 2600.com - The Hacker Quarterly . . .
The Clinton administration today said it plans to change laws governing the export of powerful encryption technologies to allow export of all information-scrambling products to any end user in the European Union and to eight other trading partners.
The Clinton administration plans to announce as early as today that it will allow US software and hardware companies such as Microsoft and Cisco Systems to compete on an equal footing with software makers from Australia and elsewhere, by doing away . . .
The American Civil Liberties Union on July 11 appealed to Congress to protect Americans from unreasonable searches and seizures on the Internet in light of recent revelations that a new monitoring tool could enable the FBI to intercept the e-mail of law-abiding citizens. . . .
The cybertrial of the century begins here Monday, according to the defendants in a case that pits nine Hollywood studios against Eric Corley, a.k.a. Emmanuel Goldstein, publisher of the small hacker 'zine known as 2600. The . . .
An amendment to the so-called snooping bill requiring the Home Secretary to sign all warrants requesting decryption codes was defeated by just one vote in the House of Lords yesterday. The amendment, defeated by 120 votes to 119, related to a . . .
Attorney General Janet Reno said Thursday she is looking into the FBI's new high-tech ``Carnivore'' system for e-mail monitoring to ensure that privacy safeguards are met as well as the needs of federal law enforcement officials. ``When we develop new technology, . . .
In letters sent to chief information officers at 16 federal agencies, the General Accounting Office has detailed widespread non-compliance with policies in place to protect the government's software code.. . .
Federal agencies are failing to follow the policies to ensure that changes in their software and systems do not open security vulnerabilities, the General Accounting Office told agency officials last month.
NTT Communications, a unit of Japanese telecommunications giant Nippon Telegraph and Telephone, today played down concerns its $5.5 billion bid for U.S. Internet service provider Verio poses a threat to U.S. national security.
SAN DIEGO--Federal investigators have launched a probe to investigate hacker attacks against wireless communications company Qualcomm.
Late last year, Aaron J. Eden, a disgruntled Army private stationed in Indianapolis, Ind., hacked into the Army's Enlisted Records and Evaluation Center system and deleted 38,000 personnel-related files.. . .
A new report on e-commerce and cybercrime provides tips for governments to consider in order to prevent security breaches. The white paper, "E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation," focuses on businesses, but the issues . . .
President Clinton on Friday signed the Electronic Signatures in Global and National Commerce Act, or E-Sign, using the first digital certificate from the General Services Administration. Under the act, online and electronic contracts signed in the private sector with an . . .
President Clinton on Friday will "e-sign" a bill that makes electronic signatures as valid as their ink counterparts in the city where America's founding fathers signed the Declaration of Independence. On the grounds in Philadelphia where the Declaration of Independence was . . .
A university student admitted in Boston federal court to breaking into U.S. government computers including Defense Department and NASA systems. Ikenna Iffih, a student at Northeastern University's College of Computer Science, pleaded guilty to a series of coast-to-coast cyber attacks before . . .