Expert analysis
A closer look at Elcomsoft Advanced Office Password Breaker 3 Enterprise Edition
Elcomsoft Advanced Office Password Breaker breaks passwords and unlocks password-protected MS Word documents and Excel spreadsheets instead of attacking and recovering complex …
Firewire-based physical security attacks on Windows 7, EFS and BitLocker
This paper discusses Firewire-based physical security attacks on Microsoft Windows 7. In the course of his research, the author was successfully able to bypass the Windows 7 …
Securing virtualized environments
IT departments are under immense pressure to deliver more functionality and capacity at a time when budgets are shrinking and costs are increasing. Mounting expenses from …
Malware beyond Vista and XP
Windows may be ubiquitous, but there’s a thriving variety of alternative operating systems for enterprise and home use. However, the alternatives aren’t as risk …
Q&A: Dasient and current threats
Ameet Ranadive is a co-founder of Dasient, an Internet security company that protects websites from web-based malware attacks. In this interview he introduces his team at …
Security considerations for ISPs complying with the European Union Data Retention Directive
Back in April of this year the UK Home Office announced that all ISPs must retain their internet-related communication data for law enforcement authorities (LEAs) to gain …
A closer look at GFI LANguard 9
GFI LANguard is a network security scanner. It performs vulnerability assessments, identifies all possible security threats and provides the tools to remediate vulnerabilities …
5 tips to stop staff snooping
In a recent Cyber-Ark survey into “The recession and its effects on work ethics” carried out amongst 250 office workers in London’s busy Canary Wharf, a …
Holiday tips for laptop security
Summer is the time when most countries have the longest vacation periods. Regardless of whether the holiday is spent indoors or outdoors, at home or overseas, most people …
VPN market choices: Aligning network planning to enterprises’ security and mobility requirements
Virtual Private Networks (VPNs) are an essential part of enterprises’ IT security policies. Unfortunately, with the variety of mobile device applications, empowering …
Safety in the cloud(s): ‘Vaporizing’ the Web application firewall to secure cloud computing
Cloud computing was not designed for security, although organizations such as Cloud Security Alliance (CSA) and Open Web Application Security Project (OWASP) are making great …
A closer look at Nero BackItUp & Burn
Nero BackItUp & Burn lets you back up files to your hard drive or to online storage, schedule automatic backups, burn music, videos, photos, and data to CDs, DVDs, and …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025