Government - Page 75
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
National Science Foundation employees received expert advice on securing their home computers at the agency's first Computer Security Awareness Day. The program Monday offered advice on how to use firewalls and protect home computers from intrusion as well as the best . . .
The number of detected attacks on unclassified Defense Department networks has leveled off this year, according to the commander who's in charge of protecting them. The number of detected "cyber events" on DOD's Non-Classified Internet Protocol Router Network increased dramatically . . .
The federal CIO Council last week released the final version of an initial framework designed to let agencies determine where improvements are needed in their security programs. The council's security subcommittee developed the Federal Information Technology Security Assessment Framework to provide . . .
The nation's top cyberspace official Friday called on the next president to boost the government's computer security to prevent a "digital Pearl Harbor." "What this presidential election year showed is that statistically improbable events can occur," Richard Clarke of the . . .
In the wake of a September report identifying security lapses in the computer system of the Federal Aviation Administration, the General Accounting Office Wednesday published official recommendations on how the agency might increase its security. . . .
McConnell International, a security consulting firm based in Washington, D.C., found that 9 of 52 countries it studied have extended existing laws to cover most crimes in cyberspace, creating massive legal gaps that make prosecution of online crimes difficult. "The long . . .
The United States has endorsed the gist of a controversial European drive to tighten cybercrime laws over the protests of privacy, civil liberties and human rights advocates. The central provisions of the 41-nation Council of Europe's latest draft convention "are consistent . . .
A coalition of high-tech companies voiced concern over the Council of Europe's latest revisions to its international cyber-crime treaty, saying the modified language still imposes burdensome data preservation requirements on Internet service providers, and could potentially restrict legal activities online.. . .
The Bureau of Labor Statistics is bolstering systems security by adding public-key infrastructure and providing smart cards to 1,500 employees. BLS will issue most of the cards to field workers who sign in to the agency's network remotely. Currently, remote users . . .
The FBI has opened its first multiagency, multijurisdictional office aimed at combating the escalation of computer-related crimes and has assigned it the task of acquiring, archiving and analyzing digital evidence in support of criminal investigations. The new facility, located in San . . .
Most of the concerns raised about the FBI's controversial e-mail surveillance tool have been overblown, according to a key member of an independent review team charged with evaluating the system, also known as "Carnivore." Still, the reviewer said, a study soon . . .
The U.S. military has a new mission: Be ready to launch a cyberattack against potential adversaries, some of whom are stockpiling cyberweapons. Such an attack would likely involve launching massive distributed denial-of-service assaults, unleashing crippling computer viruses or Trojans, and . . .
The FBI's controversial e-mail surveillance tool works about the way the bureau says and generally doesn't "overcollect" evidence, an independent reviewer of the system said. But his remarks failed to calm the fears of privacy advocates. Henry H. Perritt said . . .
What is the feasibility of running national federal elections over the Internet? SunWorld guest writer Avi Rubin focuses on the limitations of the currently deployed infrastructure, with an emphasis on concerns over the security of voting hosts and the Internet itself. . . .
Washington state agencies doing business electronically with the private sector can now be assured companies and individuals are who they say they are. By December, the state's new security architecture and transaction gateway -- called Transact Washington -- will accept digital . . .
Over the past year, FBI agent Steve McFall has investigated less than a dozen local cases of computer hacking. He suspects many more instances of corporate hacking occur in East Tennessee, however, but businesses either don't realize they can call the . . .
Computers may not be the ultimate voting tools, despite their utility for other tasks, say experts in computer security and voting. "All voting systems, including the new ones being proposed -- the Internet and direct entry balloting, they all have flaws," . . .
The world's first cybercrime treaty is being hastily redrafted after Internet lobby groups assailed it as a threat to human rights that could have "a chilling effect on the free flow of information and ideas." The Council of Europe, a 41-nation . . .
The home secretary Jack Straw will announce plans to create a £20m National High-Tech Crime Unit Monday morning according to reports Sunday. The special unit, which will include members of the police, customs and excise, the National Crime . . .
The world's first cybercrime treaty is being hastily redrafted after Internet lobby groups assailed it as a threat to human rights that could have "a chilling effect on the free flow of information and ideas." The Council of Europe, the 41-nation . . .