Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

Treasury OIG: Unauthorized and Insecure Internal Web Servers Are Connected to the Internal Revenue Service Network

Treasury Inspector General for Tax Administration: Unauthorized and Insecure Internal Web Servers Are Connected to the Internal Revenue Service Network, August 26, 2008. Reference Number: 2008-20-159 “We recommended that the Chief Information Officer establish official ownership and assign responsibilities for the web registration program, enforce IRS procedures to block unauthorized web servers from providing data… Continue Reading

National Infrastructure Advisory Council: Insider Threat to Critical Infrastructures Report and Recommendations

Transmittal Letter: “The insider threat to critical infrastructures constitutes a real and significant threat because of the potential a trusted insider has to inflict serious damage, including cascading and cross-sector effects and economic interruptions from critical infrastructure service losses. While many critical infrastructure operators have programs or measures in place addressing this threat to some… Continue Reading

DOD OIG: Accountability for Defense Security Service Assets With Personally Identifiable Information

D-2008-114 Accountability for Defense Security Service Assets With Personally Identifiable Information, July 24, 2008 (Project No. D2007-D000LC-00042.000) “DSS management in place during the transfer of the personnel security investigation function to OPM created a lack of accountability for assets, posing an undue risk of compromising [Personally Identifiable Information] PII for military, civilian, and contractor employees… Continue Reading

Majority of UK businesses miss out on instant messaging benefits because of security fears

“Research released…by instant messaging experts, ProcessOne, revealed that 72% of UK businesses have banned the use of public instant messaging (IM) software, such as MSN, AIM and Yahoo!, because of security fears. These fears include the ability for employees to download the software without the IT department’s knowledge and potentially use it to send confidential… Continue Reading

Agencies Reduce Security Vulnerabilities Under The Trusted Internet Connection Initiative

News release: “Today, the Office of Management and Budget (OMB) released the Trusted Internet Connections (TIC) Initiative Statement of Capability Evaluation Report highlighting the Federal government’s rapid progress toward strengthening IT security. This was achieved by reducing external connections, including Internet points of presence from over 4,300 reported in January 2008, to a target of… Continue Reading

NIST Draft Guidelines on Cell Phone and PDA Security

Draft SP 800-124, Guidelines on Cell Phone and PDA Security, July 2008. “Cell phones and personal digital assistants (PDAs) have become indispensable tools for today’s highly mobile workforce. Small and relatively inexpensive, these devices can be used for many functions, including sending and receiving email, storing documents, delivering presentations, and remotely accessing data. While these… Continue Reading

National Insitute of Standards Draft Guide to Bluetooth Security

Draft Guide to Bluetooth Security, July 9, 2008, SP 800-121. “Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish wireless personal area networks (WPAN), commonly referred to as ad hoc or peer-to-peer (P2P) networks. Bluetooth technology has been integrated into many types of business and consumer… Continue Reading

New on LLRX.com: 60 Gadgets in 60 Minutes, FOIA Facts, Competitive Intelligence – A Selective Resource Guide

FOIA Facts: My Proposals for the FOIA: Following up on the passage earlier this year of the OPEN Government Act of 2007, FOIA expert Scott A. Hodes make two proposals absent from the law, but which would help FOIA requesters. — Published June 29, 2008 60 Gadgets in 60 Minutes – Three techie gurus (Barbara… Continue Reading

Outbound Email and Data Loss Prevention in Today's Enterprise, 2008

Proofpoint’s Outbound Email and Data Loss Prevention in Today’s Enterprise, 2008 report – [“the survey was fielded in the US, UK, France, Germany and Australia to explore global concerns.] “Email remains the most important medium for communications both inside and outside the enterprise. But the convenience and ubiquity of email as a business communications tool… Continue Reading

FAA OIG: Audit Initiated of the Web Applications Security in Air Traffic Control Systems

Audit Initiated of the Web Applications Security in Air Traffic Control Systems, June 02, 2008. Project ID: 07F3018F000 “Summary: The Office of Inspector General is initiating an audit of web applications security in air traffic control (ATC) systems in response to a request made by the U.S. House of Representatives Committee on Transportation and Infrastructure.… Continue Reading