Please turn on your JavaScript for this page to function normally.
Interview with Janne Uusilehto, Head of Nokia Product Security

Janne is Head of Nokia Product Security, responsible for product security development at the world’s number 1 mobile device manufacturer. He is a member of several Nokia …

Block Data Leakage at the Source

Computer networks today have become increasingly open, with greater reliance on IP. More and more staff are accessing a greater number of applications and databases, while …

Theft and Snooping Alarm for Your MacBook

iAlertU is a simple utility that turns your MacBook into a motion sensitive remote controlled alarm system. I cannot think a lot of useful ways of using the software, but the …

A Security Focus on China Outsourcing

Business process outsourcing (BPO), such credit card transactions, medical claims data entry and financial transactions, has been around for a number of years. The act of …

High-Level Reverse Engineering

This paper aims to present a methodical framework for high-level reverse engineering. The methodology is a culmination of existing tools and techniques within the IT security …

Removable Devices: The Menace Within

Handheld USB devices have been a godsend to anyone who wants to take information from one PC to another, but their ease of use also has created a new type of security headache …

The Federal Bureau of Investigation – Capabilities and Service

The Federal Bureau of Investigation (FBI) is an elite law enforcement organization. This article provides an overview of FBI teams, InfraGard and the FBI Citizens’ …

Guide to Online Antivirus Solutions Part 8: CA Online Virus Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Attacking the Build through Cross-Build Injection

A poorly designed software build process can allow an attacker to insert malicious code into the final product or to take control of a build machine. This paper surveys …

Mac Security Freeware: Password Manager, Screen Locker and MD5 Checksum Checker

In a series of articles on Mac security freeware I will be covering a number of newly released security tools for Mac OS X. This time I am taking a look at KeyMaster 1.0.1 …

Solving the Keylogger Conundrum

The geek shall inherit the earth! This is the slogan that has reverberated out from Silicon Valley from the mid-90s, as we all realized that technology was, actually, fun, …

Beware the Default Password

During the course of a recent security audit I was rather surprised to find a critical system still running with a default password. The default password has long been the bug …

Don't miss

Cybersecurity news