Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: September 19th, 2014
Linux Security Week: September 15th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Security plan OK’d  12 December 2000 
Source: Federal Computer Week - Posted by Chris Pallack   
The federal CIO Council last week released the final version of an initial framework designed to let agencies determine where improvements are needed in their security programs. The council's security subcommittee developed the Federal Information Technology Security Assessment Framework to provide . . .
Next president urged to boost government computer security  10 December 2000 
Source: Nando Times - Posted by Dave Wreski   
The nation's top cyberspace official Friday called on the next president to boost the government's computer security to prevent a "digital Pearl Harbor." "What this presidential election year showed is that statistically improbable events can occur," Richard Clarke of the . . .
FAA urged to step up computer security efforts  08 December 2000 
Source: - Posted by Benjamin D. Thomas   
In the wake of a September report identifying security lapses in the computer system of the Federal Aviation Administration, the General Accounting Office Wednesday published official recommendations on how the agency might increase its security. . . .
Report: Lax Cybercrime Laws Threaten E-Commerce  07 December 2000 
Source: E-Commerce Times - Posted by Jen Olson   
McConnell International, a security consulting firm based in Washington, D.C., found that 9 of 52 countries it studied have extended existing laws to cover most crimes in cyberspace, creating massive legal gaps that make prosecution of online crimes difficult. "The long . . .
U.S. embraces European cybercrime proposal  04 December 2000 
Source: CNN - Posted by Dave Wreski   
The United States has endorsed the gist of a controversial European drive to tighten cybercrime laws over the protests of privacy, civil liberties and human rights advocates. The central provisions of the 41-nation Council of Europe's latest draft convention "are consistent . . .
Tech Groups Still Wary Of International Cyber-Crime Treaty  04 December 2000 
Source: Computer User - Posted by Dave Wreski   
A coalition of high-tech companies voiced concern over the Council of Europe's latest revisions to its international cyber-crime treaty, saying the modified language still imposes burdensome data preservation requirements on Internet service providers, and could potentially restrict legal activities online.. . .
Agency adds smart cards, PKI  01 December 2000 
Source: Federal Computer Week - Posted by Chris Pallack   
The Bureau of Labor Statistics is bolstering systems security by adding public-key infrastructure and providing smart cards to 1,500 employees. BLS will issue most of the cards to field workers who sign in to the agency's network remotely. Currently, remote users . . .
FBI steps up efforts to fight crimes related to computers  28 November 2000 
Source: Lexis-Nexus - Posted by Benjamin D. Thomas   
The FBI has opened its first multiagency, multijurisdictional office aimed at combating the escalation of computer-related crimes and has assigned it the task of acquiring, archiving and analyzing digital evidence in support of criminal investigations. The new facility, located in San . . .
Study To Identify Limits Of FBI's E-Mail Surveillance Tool  27 November 2000 
Source: Computer User - Posted by Dave Wreski   
Most of the concerns raised about the FBI's controversial e-mail surveillance tool have been overblown, according to a key member of an independent review team charged with evaluating the system, also known as "Carnivore." Still, the reviewer said, a study soon . . .
U.S. Army kick-starts cyberwar machine  25 November 2000 
Source: CNN - Posted by Benjamin D. Thomas   
The U.S. military has a new mission: Be ready to launch a cyberattack against potential adversaries, some of whom are stockpiling cyberweapons. Such an attack would likely involve launching massive distributed denial-of-service assaults, unleashing crippling computer viruses or Trojans, and . . .
<< Start < Prev 127 128 129 Next > End >>

Results 1281 - 1290 of 1405


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.