Government - Page 78
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Linux does not meet the Defense Information Infrastructure's Common Operating Environment Kernel Platform Compliance requirements for a Posix-compliant application programming interface, Posix-compliant commands and utilities, the Motif X Window System interface, the Common Desktop Environment and Network File System sockets. . . .
Rep. Tom Davis, R-Va., thinks the government also needs a privacy czar who would coordinate information protection among federal agencies. Many of those agencies have chief information officers who are responsible for privacy issues - but that's in addition to a . . .
Fighting cybercrime is complex and time-consuming. One case can involve a multitude of computer systems, networks, and administrators, and requires the cooperation of all system owners, and sometimes many nations, in order to find the perpetrator. Due to their love of . . .
It's time for the federal government to sound a security alert -- of a different sort.
The government has certified CygnaCom Solutions Inc.'s Security Evaluation Laboratory to test information security software to assure users that security products perform the functions that vendors claim.
IN WHAT SOME observers see as a significant ruling for the future of the Internet, a U.S. federal judge Thursday issued a permanent injunction barring an online hacker publication from linking to Web sites where visitors can download illegal code, such . . .
Oscar S. Cisneros writes: "Privacy groups are cheering a federal appeals court decision that promises to curb the ability of law enforcement agencies to get access to Internet-style communications. The decision also reins in the hungry maw of the government's Carnivore . . .
The FBI has 3,000 pages of documents about its ``Carnivore'' e-mail surveillance system and expects to begin releasing some to the public in about 45 days, the Justice Department said Wednesday. Additional releases should follow every 45 days until all the . . .
The Federal Court of Appeals for the District of Columbia ruled yesterday that law enforcement agents seeking to intercept data packets that combine addressing information and the content of communications must meet the higher legal requirements needed for a search warrant. . . .
An electronic balloting service stopped 35 attempts to hack into the Reform Party's presidential nomination process in another successful step toward online voting, eBallot.net Inc. officials said.
RCMP are working with the FBI to track down computer hackers who overloaded an Edmonton-based Internet service provider yesterday, denying access to some customers. Edmonton RCMP found the "denial of service" attack on OA Group Inc.'s server that barred subscribers . . .
Under pressure from Congress to better coordinate the government's response to computer viruses and other cyberattacks, the National Security Council has developed a plan outlining roles and responsibilities for federal cybersecurity organizations.
Oscar S. Cisneros writes: "A new government-approved standard for telecommunications equipment violates the Fourth Amendment's prohibition against unreasonable searches and seizures, critics say. The standard, released in updated form last week by the Telecommunication Industry Association, instructs telecommunications hardware manufacturers on . . .
A report to be published this year by one of the nation's top educators in information systems and security warns that the current system of higher education cannot support the demand for information assurance professionals and calls for a revolutionary change . . .
As unlikely as it may sound, lawyers and computer security experts agree on one thing: When it comes to determining what's legal and what's not on the information superhighway, there are more questions than answers. And the shortage of clear-cut legal . . .
Do you think there should be network security standards set by the government? According to MSNBC "insurance companies and the security industry are considering quasi-government regulation to try to compel Internet firms to take basic security steps." This was . . .
U.S. Defense Department pleas to computer hackers to quit mischief-making appear to be falling largely on deaf ears, making spotting potential national security threats more difficult, a top Pentagon expert says.. . .
The U.S. Federal Bureau of Investigation (FBI) has informed a U.S. congressman who is seeking information about an e-mail sniffer program known as Carnivore that the agency is not ready to release details about the system.. . .
Attempting to expand a system that allows disaster-relief agencies to place prioritized phone calls in times of emergency, a US government agency earlier this month asked engineers to build similar capabilities into the technology that runs the Internet. At an Aug. . . .
Despite crying "uncle" and appealing to hackers to leave their locales alone, US Defense Department officials said that mischief-making cyber vandals continue to target Pentagon Web sites. The ongoing acts, or "events," as described in a Reuters report, include probes, scans, . . .