Please turn on your JavaScript for this page to function normally.
Dissecting and Digging Application Source Code for Vulnerabilities

Application source code scanning for vulnerability detection is an interesting challenge and relatively complex problem as well. There are several security issues which are …

Key Management for Enterprise Data Encryption

Data encryption and key management in the real world Best practices dictate that we must protect sensitive data at the point of capture, as it’s transferred over the …

phpBB hacks: password security, anti robot login and a full board security system

phpBB uses its own authorisation/session handling, database abstraction layer and template systems, so there are numerous guides on how to use them to create your own …

Security Predictions for 2008

Saumil Shah is the founder and CEO of Net-Square. In this video, made at Black Hat, he presents an overview on what we can expect in 2008. Saumil bases his assessment on seven …

Security Extensions for Your Joomla! Installation

Joomla! is a free, open source Content Management System that allows you to build websites and other online applications. Because it’s easy to install and simple to …

On the Security of E-Passports

The global introduction of electronic passports is a large coordinated attempt to increase passport security. Issuing countries can use the technology to combat passport …

WordPress Security Plugins

WordPress is a powerful publishing platform that is easy to use and offers anyone the possibility to start a blog in no time. Because of its versatility and a large quantity …

The Case for Automated Log Management in Meeting HIPAA Compliance

The Impact of HIPAA The Health Insurance Portability Accountability Act, better known as HIPAA, was passed in 1996 by the US Department of Health and Human Standards (HHS) to …

Privacy: Erase Your Hard Drive

You may not be aware of this, but merely erasing your data the regular way does not make it disappear for good. Some of it can still be retrieved with the use of recovery …

Network Access Control (NAC)

The three cardinal questions for security compliance, which every network administrator and owner endeavour to answer are: How do I stop unauthorized users and endpoints from …

Security Plugins for Movable Type

Movable Type is a popular weblog publishing system that supports a variety of plugins. This article lists some very useful security-oriented plugins that can enhance your …

Safeguard Your Organization with Proper Password Management

Access control is one way to ensure security in your organization. An intruder can break into your network by compromising accounts with weak passwords. If the compromised …

Don't miss

Cybersecurity news