Expert analysis
Certifying Information Security Management Systems
An information security management system (ISMS) is focused on managing information security within an organization, a topic that is of growing concern to many organizations …
Secure Encryption and Backup with Knox
Mac geeks usually have the Disk Utility placed somewhere within easy reach ready to be fired up to make encrypted disk images whenever needed. However, there’s a more …
Open Source Filtering Solutions and the Spam Problem
Let us face it, modern e-mail communication relying on SMTP is fundamentally broken – there is no sender authentication. There are lot of countermeasures in form of …
Online Secure Backups with the Allmydata Web 2.0 Application
Backups are an important part of anyone’s computer life. As a result of Murphy’s Laws, you will lose your precious data in the most inappropriate situation, so …
Tunnelling HTTP Traffic Through XSS Channels
An XSS Channel is an interactive communication channel between two systems which is opened by an XSS attack. At a technical level, it is a type of AJAX application which can …
Running the PuTTY SSH Client on a Nokia E61
PuTTY allows you to use your Symbian-powered mobile device to connect securely to a remote computer no matter where you are located. The software is free and it enables you to …
Know The Enemy Within
Have you ever wondered about exactly how much of a threat your users are to your organization? Well, wonder no more, as an in depth study by Queens University, Belfast and …
Preventing Spam with Unique Disposable E-Mail Services
I really don’t need to talk about the current situation with spam on the Internet. I have 10+ mailboxes, all of them receiving at least 50 spam e-mails per day, but I …
Easy Packet Sniffing on Mac OS X
If you have more than one workstation, you administer several machines connected to a network, or just frequently connect to various networks, sooner or later you’ll …
The Evolution of Self-Defense Technologies in Malware
This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also …
Apache Prefork MPM Vulnerabilities
This case study is a result of source code analysis of Apache httpd server MPM modules. The main goal of this document is to show what may be done by an attacker who has the …
Taking Ownership of the Trusted Platform Module Chip on Intel Macs
I have been following the works of Trusted Computing Group (TCG) since their inception. The body, successor to the Trusted Computing Platform Alliance started by such giants …
Featured news
Sponsored
Don't miss
- Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
- LastPass users targeted by vishing attackers
- Protobom: Open-source software supply chain tool
- The key pillars of domain security
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)