Please turn on your JavaScript for this page to function normally.
Does application security pay?

The last decade has seen a dramatic shift in the way companies manage information security and protect vital data. In the past, businesses confronted the threat of cyber …

PacketWars: A cyber security sport for a cyber age

In this day and (cyber)age, hacking contests are sprouting like mushrooms after the rain – and it’s a good thing they do. For what better venue is there for …

How to choose a web vulnerability scanner

Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the process of choosing a web vulnerability scanner and underlines several factors that …

Inside the mind of a computer forensics investigator

Jess Garcia, founder of One eSecurity, is a senior security engineer and an active security researcher in areas of incident response, computer forensics and honeynets. In this …

A closer look at NetShade for Mac

NetShade (v.4.0.1) makes your presence on the web anonymous by routing your connection through a proxy server and acting as the middle-man in your connection. The proxy server …

A closer look at Sophos Anti-Virus for Mac Home Edition

The Home Edition of Sophos’ Anti-Virus for Mac is a full-featured and free anti-virus solution for home users. It stops, quarantines and cleans up threats that try to …

Smart grid security facts

Tony Flick has worked for over eight years in the security industry and is currently a Principal with Tampa-based FYRM Associates. He has presented at Black Hat, DEF CON, …

No big bang in PCI 2.0

As expected, PCI 2.0 rolls up a number of minor changes, but there really is no Big Bang in this document. A number of people have been disappointed by this since for the past …

Fixing weak passwords

Passwords have been present in information technology since the earliest days, but it’s only in the last five years that computers have become powerful enough to crack …

Cloud security risks, benefits and cost savings

Harold Moss is the Emerging Tech & Cloud Computing Technical Architect, IBM Security Strategy. In this interview he talks about the security of cloud service providers, …

A closer look at Watchmac

Watchmac (v.1.6) is a handy piece of software that will tell you if someone has fiddled with your laptop while you were gone – moved it, removed its battery or unplugged …

Wireless security considerations

Brad Haines is chief researcher of Renderlab.net and a noted expert in the field of wireless security. Brad has spoken at many international conferences and taught several …

Don't miss

Cybersecurity news