Government - Page 74
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Police in Boston had reached a dead end. They had a murder suspect, but not nearly enough evidence, and the investigation was growing cold. But a computer-trained ATF agent went undercover, and for once, used the Internet's anonymity to law enforcement's . . .
The Electronic Frontier Foundation (EFF), an online civil liberties group, said it has petitioned a federal appeals court to overturn a lower court's interpretation of the Digital Millennium Copyright Act (DMCA). The group said in a statement that the . . .
The U.S. Postal Service unveiled a new service Tuesday that allows government agencies to send and receive sensitive documents such as birth certificates and medical records over the Internet in a secure manner. . . .
The FBI has gone into a back-slapping frenzy over what it claims was a conspiracy to "bring down the Internet" on New Year's Eve. It gets better. This vast, evil conspiracy was being run by kids - crazed teenage hackers no . . .
Pimpshiz', the hacker who sprayed pro-Napster messages on hundreds of Web sites last year, may have been caught. US police raided the home of a 17-year-old last month after being tipped off by the FBI, a fact they confirmed to CNet . . .
Plans to let the public report crimes via a national police website have raised fears that citizens will be vulnerable to revenge attacks if computer security fails. Home Office minister Charles Clarke told the House of Commons this week that he . . .
The White House yesterday essentially threw in the towel on the government's ability to limit exports of high-performance computers, while also acknowledging that there's little the U.S. can do to prevent other nations from developing high-powered systems by harnessing computer power . . .
A shy, spiky-haired 24-year-old reputedly unleashes a global computer virus causing an estimated $10 billion in damages, paralyzing computers from the Pentagon to the Parliament. Hackers spend six weeks peering at Microsoft's network programming code for a new generation of Microsoft . . .
A group of federal agencies is collaborating to crack down on unsolicited commercial e-mail. The Federal Trade Commission last Friday released the results of part of its "Project Mailbox IV," an effort by the FTC, the U.S. Postal Inspection Service, . . .
Music bootleggers and software crackers tired of wading through the entire United States Code to see if they're about to break the law, or incur daunting criminal liabilities in excess of the potential value of their planned activities, may now consult . . .
To the NSA, of course, its devilish reputation is merely an unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden, has taken every opportunity to say so, most recently on a History Channel documentary that aired for the first time Monday . . .
Gov. Gray Davis will ask the Legislature for nearly $86 million to combat identity theft and other high-tech crimes in California, his aides said Sunday. The governor also will ask for more money for crime labs in the state, continued . . .
The ultra-secretive US spy agency, the National Security Agency (NSA), has released a prototype for an ultra-secure version of the Linux operating system. Developed in co-operation with industry research partners, the prototype includes enhancements to Linux which provide stronger protection against . . .
The FBI announced Friday the completion of a program that seeks to combat cybercrime by encouraging companies to share information about Internet attacks they have experienced. Participating companies and the FBI would use encrypted e-mail and a secure website to warn . . .
In its new session that began this week, the U.S. Congress is facing two big high-tech issues: Internet taxes and online privacy. On the tax issue, in particular, the clock is ticking. The Internet tax moratorium act, which blocks new . . .
Information security is no longer about refining technology, but helping people and improving processes. This was the key theme of the recent Intermedia Group E-Security Conference and Exposition in Arlington, Va. The conference featured some of the most respected information security . . .
As George W. Bush strides toward the White House, national security experts are preparing for what could be a major change in the way the government and the private sector organize to defend against cyber-attacks. Clinton administration officials and other national . . .
The number of cyberattacks and intrusions into Pentagon computer networks this year is expected to top off at 24,000, an increase of 5 percent compared with last year, said the U.S. Department of Defense. However, the overwhelming majority of those intrusions . . .
A tiff between two IT contractors that spiralled into federal court ended last month with a US district court ruling in Georgia that port scans of a network do not damage it, in reference to a section of the anti-hacking laws . . .
The new program provides scholarships for the study of information security to students in exchange for a two-year commitment to work for the federal government in the information security field. The scholarships support two years of study in information security at either the graduate or undergraduate level.. . .