LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Government
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Europe to get tough on cybercrime  01 August 2000 
Source: TheRegister - Posted by Chris Parker   
European politicians are to get tough on cyber villains by introducing new laws to combat kiddie porn, fraud, drug dealing and online terrorism.
 
Join Us, Don't Fight Us, Pentagon Tells Hackers  01 August 2000 
Source: FoxNews - Posted by Dave Wreski   
The largest-ever convention of computer hackers opened here on Friday with top-ranking U.S. military officials offering to hire the elite of the cybervandal world and put them to work defending against foreign government attacks. "I invite you to join the government, . . .
 
Fighting online leaks  31 July 2000 
Source: Fcw.com - Posted by Chris Pallack   
When a classified CIA overview of the U.S. intelligence community appeared on the Internet this month, it raised serious questions in national security circles about how the Digital Age has popped the top off classified information.
 
Cybercops Need Better Tools  31 July 2000 
Source: PCWorld.com - Posted by Chris Parker   
Computer crimes are escalating at a rate consistent with the growth of the Internet, says Dominique Brezinski, technical guru at In-Q-Tel, a nonprofit technology incubator formed by the CIA.
 
Pentagon scrutinizes handheld security  31 July 2000 
Source: Federal Computer Week - Posted by Dave Wreski   
The Defense Department is conducting a top-down review of security concerning the use of personal electronic devices, including palmtop computers, certain pagers, cell phones and laptop computers. The review is part of a larger DOD effort to institute tougher security measures . . .
 
Join the Navy, hack the world  30 July 2000 
Source: The Register - Posted by Chris Parker   
This year's 'Meet the Fed' session at Defcon in Las Vegas became something of a government recruiting opportunity as US Assistant Defence Secretary for Command, Control, Communications and Intelligence Arthur Money appealed to an audience composed largely of ubergeeks, h4x0rz and . . .
 
U.S. Wants More Cybercrime Laws  27 July 2000 
Source: Wired - Posted by Chris Parker   
More than 100 countries do not have the laws to deal with computer-related crime, undercutting efforts to battle a growing international threat, law enforcement officials said on Wednesday.
 
Carnivore and Open Source Software  25 July 2000 
Source: Crypto.com - Posted by Dave Wreski   
Matt Blaze talks about the FBIs Carnivore system. "The "Carnivore" system runs on an FBI-owned PC that can be installed at an ISP to collect IP traffic as part of a court-ordered wiretap. Not much detail is publicly known about exactly . . .
 
Secret CIA Papers Posted On Web Site  25 July 2000 
Source: ComputerUser - Posted by Jen Olson   
A New York-based Web site has reportedly published a secret overview of the US intelligence community prepared by the CIA in 1998 for visiting for Japanese intelligence officials. An Associated Press report said the briefing contained information on the CIA's budgets . . .
 
FBI under gun to release Carnivore code  25 July 2000 
Source: ZDNet - Posted by Dave Wreski   
The Federal Bureau of Investigation is under increasing pressure to disclose the secret blueprints for its Carnivore surveillance system so independent technical experts can verify that the software monitors only the Internet communications of criminal suspects.
 
<< Start < Prev 136 137 138 Next > End >>

Results 1371 - 1380 of 1403
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System
Internet of things big security worry, says HP
Boffins build FREE SUPERCOMPUTER from free cloud server trials
Insecure Connections: Enterprises hacked after neglecting third-party risks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.