Government - Page 38
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
With accusations spreading about electronic voting susceptibility to tampering, watchdog groups are calling on computer experts to come to the polls not only to vote, but to watch others vote. . . .
National governments, with input from nongovernmental organizations, are laying the groundwork for a new internet governance structure. Hosted by the Geneva-based International Telecommunication Union, a United Nations agency, the World Summit on the Information Society, to conclude next year, is an effort to find a common vision for the information society. . . .
A new California law aimed at curbing spyware, software applications that surreptitiously collect the keystrokes, passwords, and credit-card numbers of Internet users, will go into effect Jan. 1. . . .
The government's cybersecurity chief has abruptly resigned after one year with the Department of Homeland Security, confiding to industry colleagues his frustration over what he considers a lack of attention paid to computer security issues within the agency. . . .
SACRAMENTO, Calif. -- Gov. Arnold Schwarzenegger has signed separate legislation designed to combat spyware and the illegal online swapping of copyright material. . . .
As Congress clambers to wrap up its work for the year, cyber-security proponents are scrambling to ensure that the safety of data networks is not lost in the debate over physical security and the recommendations of the 9/11 Commission. . . .
A group of 28 IT, defense and integration companies formed a new consortium to develop technology standards and guidelines that will aid collaboration among military, intelligence, homeland security and law enforcement agencies. . . .
The Homeland Security Department plans within the next few months to establish goals, performance measures and timelines for its eight priority IT areas, according to a Government Accountability Office report issued today. . . .
DUBAI - A large number of corporations in Middle East are beginning to identify 'information security' as a core area of corporate governance, said sources from information security sector.The need of the hour for Middle East is to have effective Information Secured networks to protect from potential network threats. . . .
THE DEpartment of Homeland Security is to lose its cyber-security arm to the Whiten House.According to draft legislation obtained Wednesday by The Associated Press, the move follows complaints amoung Republican congress people about . . .
The National Science Foundation announced Tuesday that it has granted more than $12 million to academic researchers for the creation of two centers to investigate infectious code and study the Internet's ecology. . . .
The U.S. Defense Department said Tuesday that it's trying to find a way to permit American expatriates to connect to an absentee voting site that has been cordoned off because of the risk of hackers. . . .
Authorities in the US are considering a $250,000 bounty on spammers in an attempt to close them down.The US Federal Trade Commission (FTC) has suggested rewards of anything from $100,000 to $250,000 for information. . . .
Lockheed Martin delivered a High Performance Computing (HPC) solution to the US Navy last year to run sonar systems in nuclear submarines. The solutions involved Apple Xserve systems using G4 processors and a Red Hat Linux-based operating system. . . .
An international conference opened Wednesday amid warnings that companies, governments and individuals are increasingly vulnerable to Internet attacks by terrorists, hackers and others that rob them of privacy, money, and secrets. . . .
IDAHO FALLS, Idaho--Jason Larsen types in a few lines of computer code to hack into the controls of a nearby chemical plant. Then he finds an online video camera inside and confirms that he has pumped up a pressure value. . . .
When one compares the enterprise market to the consumer market, one can understand why Red Hat, Novell SuSE, IBM, HP and Sun have put their focus on the enterprise market. That doesn't provide accountability to the tens of thousands of people who made GNU/Linux competitive in the enterprise market in the first place, however. So, let's look at the current situation. . . .
The maker of a software security analysis tool is promoting quality assurance for outsourced code development. "We're going to help drive new behavior," said Jack Danahy, president and CEO of Ounce Labs Inc. of Waltham, Mass. . . .
A new security specification for wireless networking incorporates the Advanced Encryption Standard, opening the door for certification under the Federal Information Processing Standard. WiFi Protected Access 2 is a technical specification from the Wi-Fi Alliance based on the recently approved 802.11i standard. . . .
A Massachusetts businessman allegedly paid members of the computer underground to launch organized, crippling distributed denial of service (DDoS) attacks against three of his competitors, in what federal officials are calling the first criminal case to arise from a DDoS-for-hire scheme. . . .