Expert analysis
Memo to CIOs: Your next security crisis may have nothing to do with cyber attacks
I must admit I’m as much to blame here as anyone. After all, I’m the head of a company that prides itself on offering security appliances that will halt any …
Q&A: Privacy and anonymity with Tor
Andrew Lewman is executive director of The Tor Project, a non-profit organization providing research and free software that protects your online privacy and anonymity. He is a …
Q&A: Cain & Abel, the password recovery tool
Massimiliano Montoro is the mastermind behind Cain & Abel, the password recovery tool for Windows. In this interview he provides insight on the history of the tool, the …
A closer look at SpywareBlaster 4.2
SpywareBlaster prevents the installation of ActiveX-based spyware, adware, dialers, browser hijackers, and other potentially unwanted programs. It can also block …
A closer look at Little Snitch 2.1.4
Little Snitch is a Mac tool that protects private data from undesirable transmission. It informs you whenever a program attempts to establish an outgoing Internet connection. …
Q&A: The Kantara Initiative and the global identity landscape
Roger Sullivan serves as president of the Kantara Initiative Board of Trustees and president of the Liberty Alliance Management Board. He is vice president, Oracle Identity …
A closer look at Spybot – Search & Destroy 1.6.2
Spybot – Search & Destroy can detect and remove adware files and modules from your computer. Spybot also can clean program and Web-usage tracks from your system. …
The evolution of Qualys
Qualys CEO Philippe Courtot discusses the evolution of Qualys, from the early days to current projects and future ideas.
A closer look at MacScan 2.6.1
MacScan detects, isolates, and removes spyware applications such as keystroke loggers and trojan horses. Blacklisted cookie scanner removes tracking cookies without saved …
A closer look at Malwarebytes Anti-Malware 1.38
Malwarebytes’ Anti-Malware is an anti-malware application that removes even the most advanced malware and spyware. The full version of the product includes a number of …
Q&A: L0phtCrack 6
In this interview, L0phtcrack core team member Chris Wysopal discusses the history of this legendary password auditing and recovery tool as well as the features in the latest …
How to marry security and systems management
New security threats emerge every day. From large-scale virus and worm outbreaks through to phishing and social engineering attacks, the growth of malware is forcing …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025