Government - Page 42

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Government planning cyberalert system

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. Department of Homeland Security plans to announce details of a cyberalert system on Wednesday, two days after a virus called MyDoom spread rapidly across the Internet. The system, which will be detailed by the department's National Cyber Security Division, could mimic the color-coded scheme the government uses to warn citizens and alert law enforcement authorities of terrorism threats, a source familiar with some details of the plan said. . . .

Infiltration of files seen as extensive

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Depending on how this goes, this might well have a strong influence on future computer privacy and anti-hacking laws. It appears as though, due to security negligance on the Democrats' part and weak ethics on the Republicans, the GOP side of the isle has been reading Democrat internal memos for at least a year. On the other hand, the information was highly embaressing for the Democratic victims, who may want to avoid calling further attention to the stolen memos. . . .

Linux threatens US security, SCO tells Congress

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"A computer expert in North Korea who has a number of personal computers and an internet connection can download the latest version of Linux, complete with multiprocessing capabilities misappropriated from Unix, and, in short order, build a virtual supercomputer," the letter says. . . .

Homeland Security looks to industry to secure nation's infrastructure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Homeland Security Department officials said Monday that the government does not plan to place many security requirements on private industry when it comes to protecting the nation's critical infrastructure. James Loy, the department's deputy secretary, said the federal government will back away from issuing new security mandates to industry, and instead let private companies take the lead "in most cases" to protect critical infrastructure, such as power plants and water reservoirs. . . .

Legislation and security will drive technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Similar to Gramm-Leach, the Health Insurance Portability and Accountability Act, or HIPAA, is designed to protect the privacy and confidentiality of patients and their medical records. Much as Gramm-Leach has made financial institutions assess the security of their customer data, HIPAA forces health-care organizations to evaluate the security of their patient data. . . .

School District Gives Linux Security Technology High Grades

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As any corporate IT administrator knows, network security is no longer a luxury, but a necessity. If your network is not secure, not only do you risk losing valuable corporate information, but you also run the risk of being liable if your network is used to disrupt other sites, as with Distributed Denial of Service (DDoS) attacks. With this in mind, corporations are spending more and more on network security, even while other corporate spending is being curtailed. . . .

Computer sleuths ply Internet

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A 13-year-old girl sat at a computer in Orangeburg, making arrangements to have sex with an older man from Charleston. At least that's what the man thought. When he arrived at the appointed place in Orangeburg, it was not a young girl who met him. It was the law. . . .

Judge Dismisses AOL Spam Lawsuit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Just in case we needed more evidence that the US court system alone will not be enough to stem the tide of spam, here is a story which demonstrates one of the big stumbling blocks to enforcement: jurisdiction. . . .

For Global ID Systems, the Tried and True

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A growing number of people will carry their identifying data on microchips in passports, employment ID cards or drivers' licenses in 2004, analysts say. But the data is useless unless the technologies and public records are integrated, a job that has become a fast-growing business for data processing giants like I.B.M., Unisys and Siemens. "The technology is advancing rapidly," said Ed Schaffner, director of positive ID and access control solutions at Unisys, who said that the first government agencies to adopt the technology would put their systems in place in 2004. "The big growth will be in 2005 and 2006," he said.. . .

US demands compensation from

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The compensation demand, believed to be the first time an organisation has used the UK criminal courts to recover the costs of repairing hacked computer systems, could set a precedent for future prosecutions against computer criminals. Joseph James McElroy, 18, a . . .

Security Best Practices Should Come Top Down

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The federal government should leverage its legislative and purchasing power to force rapid improvement in the state of operating system and application security and quality. And it must quickly do a better job setting itself up as a model of IT security, as called for in the government's plan to secure cyberspace.. . .

Next stop, jail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You can count on companies to talk about implementing cybersecurity guidelines and best practices until they're blue in the face. Truth be told, however, you won't see major changes until the law holds actual fannies to the fire.. . .

Feds Unite on Security Benchmarks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of high-level IT officials in the federal government has begun collaborating on configuration benchmarks that government agencies could be required to use in future purchases of hardware and software. The development of the benchmarks is at once an indication . . .

Bush signs bill aimed at controlling spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Known as the CAN-SPAM Act, the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 takes effect Jan. 1. The law prohibits the use of false header information in bulk commercial e-mail and requires unsolicited messages to include opt-out . . .

Homeland agency scores 'F' for network security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The US federal government's latest computer-security report has given the Department of Homeland Security a failing 'F' grade US federal departments and agencies are showing some improvement in protecting their computer networks, but many -- including the Department of Homeland Security . . .

Security Info Center Gets $2 Million

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Treasury Department on Tuesday signed a $2 million one-time contract to upgrade the Financial Services Information Sharing and Analysis Center (FS/ISAC), which serves as the central point for the sector's critical infrastructure warnings. . .

Many Federal Agencies Flunk Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal agencies have made only small improvements in securing government networks and IT systems from hackers and terrorists. A House panel on Tuesday issued a scorecard, giving the federal government an overall grade of D.. . .

China implements new Wi-Fi security standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Chinese government agencies are prohibiting the import, manufacture and sale of Wi-Fi gear that does not use China's new security specification, which is incompatible with standards technology industry groups developed.. . .