Government - Page 62
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
n a move applauded by government officials, the Bush administration last week announced plans to establish a central office to coordinate the government's response to cybersecurity attacks. The center will be modeled on the Year 2000 Information Coordination Center (ICC), which . . .
The United States might retaliate militarily if foreign countries or terrorist groups abroad try to strike this country through the Internet, the White House technology adviser said Wednesday. "We reserve the right to respond in any way appropriate: through covert action, . . .
The FTC's operation began in 2000, when it sent 1,000 spammers letters to warn them that a particular e-mail chain letter scheme they were involved in was illegal. Chain letters that promise money or other value to the recipient in exchange . . .
The first guidelines for responding to attacks on computer systems to be endorsed by both the FBI and the Secret Service, the main federal agencies fighting such crimes, were published yesterday. The guidelines were drafted by government and private security experts . . .
Some forms of illegal hacking would be punished by life imprisonment under a proposal that Congress will debate on Tuesday. A House Judiciary subcommittee will consider the Cyber Security Enhancement Act (CSEA), which ups the penalties for computer intrusions, funds . . .
The Federal Trade Commission is training its legal guns on spam. On Tuesday, the agency plans to unveil an aggressive three-point program to crack down on unwanted commercial e-mail. The agency receives about 10,000 e-mails a day in a database it set up for consumers to forward their unsolicited mail.. . .
The House approved more than $800 million in grants today covering the next five years for the National Science Foundation and the National Institute of Standards and Technology to conduct research on ways to strengthen network and computer security. "Our . . .
Government computers that keep track of trillions of dollars as they flow in and out of Washington D.C. remain vulnerable to computer hackers, according to a report released by Congress' General Accounting Office. The report says that Treasury Department computer systems . . .
An influential high-tech lobby group Thursday told leadership in the House of Representatives that it supports a cybersecurity bill backed by Rep. Sherwood Boehlert, R-N.Y., that is "crucial" for increasing online security research. Information Technology Association of America (ITAA) President Harris . . .
The U.S. Justice Department has begun soliciting hundreds of resumes from attorneys skilled in computer crime and intellectual property law in an effort to keep pace with a growing caseload of cybercrime prosecutions. The Justice Department recently sent out a notice . . .
The National Institute of Standards and Technology's security team will be releasing more than 30 guides over the coming year to help agencies with many crucial technical and policy security concerns, officials said last week. The NIST Computer Security Resource Center . . .
A Washington, D.C., think tank is calling for increased use of information technology -- including smart identification cards and the linking of databases -- to improve homeland security. It also advocates the creation of a chief information officer responsible for reviewing . . .
An influential body of researchers is calling on the US Government to draft laws that would punish software firms that do not do enough to make their products secure. The US National Academy of Sciences (NAS) has released drafts of a . . .
The Transportation Department is working with the Bush administration to ensure that information security is not left behind as increasing amounts of money go to strengthen the other forms of security throughout the department, top information technology officials said Jan. 14.. . .
An IT security crisis was a key factor in the abrupt end of the government's Individual Learning Accounts (ILA) training scheme last November, it emerged this morning. At the time silicon.com revealed that the scheme was open to abuse as bogus . . .
Lawyers for the New York-based "hacker quarterly" 2600 magazine have asked that the full 2nd Circuit Court of Appeals reconsider a decision by three of its judges to uphold a ban on publishing software code that can unlock encrypted video on DVDs.. . .
U.S. computer systems are increasingly vulnerable to cyber attacks, partly because companies are not implementing security measures already available, according to a new report released Tuesday. "From an operational standpoint, cyber security today is far worse that what known best practices . . .
Most of the federal money made available after the Sept. 11 terrorist attacks is not going to information technology projects, but technology will play a larger role as agencies determine their homeland security needs during the coming months, industry experts said . . .
A U.S. congressman said Monday that he intended to change a controversial copyright law to allow consumers to override technologies that prevent them from making digital copies of music, movies and software. Rep. Rick Boucher, D-Va., said he plans to introduce a bill that would eliminate the "anti-circumvention" clause of the Digital Millennium Copyright Act (DMCA), a 1998 law that updated copyright laws for the digital era. . . .
A federal judge in New Jersey has ruled that evidence secretly gathered by the FBI to catch an alleged mob loan shark can be used in a trial later this year. US District Judge Nicholas Politan said it was acceptable for . . .