Government - Page 21
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
THE parliamentary computers of at least 10 federal ministers including the Prime Minister, Foreign Minister and Defence Minister are suspected of being hacked into in a major breach of national security.
Privacy protections "must advance with technology" or privacy will "gradually erode as technology advances." So said the Senate Judiciary Committee -- in 1986, the year that the Electronic Communications Privacy Act (ECPA) was passed.
Albert Gonzalez, the hacker who pleaded guilty to leading one of the largest cases of credit card theft in the U.S., is asking a judge to toss out the pleas, arguing that they were part of his assignments as a paid government informant.
The Obama Administration is backing a new data privacy bill of rights aimed at protecting consumers against indiscriminate online tracking and data collection by advertisers.
At long last, a version of the U.S. Government Configuration Baseline (USGCB) for Red Hat Linux Desktop is in the house. The first set of USGCB security requirements were created some five years ago by the Office of Management and Budget, specifically for Windows Vista, with the assurance that other OSes would follow.
Friendly hackers and other computer whizzes who could help bolster government's cyber defenses often are unable to collaborate with the Homeland Security Department because of outdated policies that Congress and the White House must reform, former DHS Secretary Tom Ridge said on Tuesday.
A federal judge has dismissed all but one of the claims leveled against Sony for dropping Linux support from its PlayStation 3 game console, but gave the plaintiffs permission to refile an amended complaint that fixes the deficiencies.
Howard Schmidt talks global cooperation in cyberattack prevention, and how the feds should share threat intelligence with private industry. President Obama's cybersecurity coordinator last week hinted that an official effort to foster international cooperation in preventing cybercrime and cyberespionage while protecting privacy and freedom on the Internet could soon be in the works.
Three U.S. senators criticized for past legislation that would allow the president to potentially quarantine or shut down parts of the Internet during a major cyberattack have introduced a new bill that would put limits on that authority.
The federal government's unprecedented practice of confiscating internet domain names in secret court proceedings took a new and ominous turn last week when it resulted in the closure of as many as 84,000 website addresses.
U.S senators will introduce legislation this year targeting websites that traffic in digital piracy or counterfeited goods, said the primary sponsor of a controversial bill proposed in 2010 that would give government agencies more authority to shut down those sites.
A cybersecurity proposal in the U.S. Congress, called an "Internet kill switch" plan by some critics, isn't exactly what that sounds like.
On the heels of what's being described as the biggest electronic shutdown by a government, legislators in the U.S. are trying to reintroduce a bill that would give the President an Internet 'kill switch.'
It seems that the so-called Internet "kill switch" legislation has resurfaced, according to the proposal's chief sponsor. The legislation came into play the same day Egyptians faced an internet blackout designed to counter massive demonstrations in that country.
Scotland Yard has arrested five people under the Computer Misuse Act as part of its investigation into alleged attacks by the Anonymous hacking collective.
The Web has been abuzz with the revelation that hacked government and military Web sites, as well as databases of personal information are available for less than $500. As concerning as that may be, what should keep IT admins awake at night is the broader realization that these are only the hacked sites that were discovered on the hacker underground. There are more, and your site could be one of them.
On the Deeplinks blog at eff.org Corynne McSherry and Marcia Hofmann report on the case of Sony vs Hotz. The implications of the case are broad reaching and frightening. Sony is suing researchers for the crime of exposing security holes. The researchers found security holes that allow users to run Linux on the Playstation 3 - something Sony allowed until recently.
The Spanish Ministry of the Interior has expressed its regret that an international crackdown on IT masterminds inside the violent Basque separatist group ETA was dubbed "Operation Linux". Apparently, penguin-loving outfits are complaining that the antiterrorist operation sullies their good name.
Prompted by fallout from the WikiLeaks debacle, the White House Office of Management and Budget has asked all federal agencies and departments handling classified data to shore up efforts to identify untrustworthy and discontented employees.