Forensic IT Trends Survey 2002

What are the trends in forensic IT reseach? Which tools are used? What are the objectives of a forensic IT investigation? These questions are answered in this small survey. …

A matter of trust or is it?

Who do you know who you are really dealing with when disclosing your personal details over the Internet? How can you ensure the credit card details you submit are to the site …

Authentication – who’s site is it really?

There are many issues in the business of authentication, and methods by which it is achieved, that are worth discussing at some length, but that is not the topic of this paper …

Critical Microsoft Vulnerability Announced

In the 65th Security Bulletin this year, Microsoft announced a critical vulnerability in Microsoft Data Access Components, a collection of components used to provide database …