Please turn on your JavaScript for this page to function normally.
Secure File Upload in PHP Web Applications

Various web applications allow users to upload files. Web forums let users upload avatars. Photo galleries let users upload pictures. Social networking web sites may allow …

Data Seepage: How to Give Attackers a Roadmap to Your Network

At Black Hat Europe we met with Robert Graham and David Maynor, the CEO and CTO of Errata Security. In this video they talk about how the days of widespread internet attacks …

Symbian-Based Smartphone Security Software

With over 110 million Symbian smartphones shipped worldwide, this OS is becoming very popular and the need for security tools is growing. Presented here are applications you …

Anomaly-Based Unsupervised Intrusion Detection

At Black Hat Europe we met Stefano Zanero who talked about anomaly-based unsupervised intrusion detection. In this video he provides an overview of his research into the …

Details on Microsoft Identity Lifecycle Manager 2007

Peter Houston, the Senior Director for Identity and Access Management at Microsoft speaks about Microsoft Identity Lifecycle Manager 2007 and provides details about how this …

Wardriving in London 2007

Conducting regular research into WiFi networks and wireless protocols can help us gain a better understanding of the true state of affairs in this area. When possible, we try …

Survey Reveals Scandal of Snooping IT Staff

Whilst you sit at your desk working innocently away, little do you realize that one in three of your IT work colleagues are snooping through company systems, peeking at …

Lessons From a Honeynet That Attracted 700,000 Attacks

Over the 5 year lifetime of the IrishHoneynet, we have witnessed hundreds of thousands of scans, probes and attacks against the servers that comprise the network. Our …

How To Prepare For a Security Information and Event Management Deployment

Fail to prepare, as the saying goes, and you prepare to fail. This maxim certainly applies to most large-scale IT projects, and doubly so for Security Information and Event …

Stephen Northcutt on Security Certification and the SANS Top 20

Stephen Northcutt, the CEO of the SANS Institute, provides us with an overview of SANS activities, the Internet Storm Center, the SANS Top 20 and the evolution of the IT …

Today’s Biggest IT Security Menace and 6 Ways to Fight It

What is today’s biggest IT security threat? IT itself, according to recent reports from IDC and Carnegie Mellon/DoD. To begin with, IDC research finds that enterprise …

The Future of Spam

In the 1930s, the US psychologist Abraham Maslow formulated a theory that according to which, everybody has a series of basic needs that must be covered in a certain order, so …

Don't miss

Cybersecurity news