Please turn on your JavaScript for this page to function normally.
JavaScript Hijacking

An increasing number of rich Web applications, often called AJAX applications, make use of JavaScript as a data transport mechanism. This paper describes a vulnerability we …

Key features in GFI LANguard Network Security Scanner 8

Andre Muscat, the Director for the Development of Network Security Products at GFI discusses the key features in the latest release of the GFI LANguard Network Security …

Web Application Security with Jeremiah Grossman

Jeremiah Grossman is the CTO of WhiteHat Security. In this video he talks about the differences between web application security and network security, the assessment process …

HNS Podcast: Common Mistakes Made By IT Administrators

George Gerchow has more than 12 years of IT and systems experience in Education, Finance and Government environments. He is the Technology Strategist for Configuresoft and a …

Biometrics: What and How

Humans use body characteristics to recognize each other. Some characteristics don’t change over time and some do. What characteristics do we use for identifying people? …

RSS Security Threats With Financial Services

Web 2.0 technologies are penetrating deeper into the financial services sector as Enterprise 2.0 solutions, adding value to financial services. Analysts can leverage …

Practical Tips for Safer Computing

David Perry, the Global Director of Education at Trend Micro, discusses the Malware Report for 2007 and offers a variety of practical tips for safer computing that will …

Modifications for Stopping phpBB Forum Spambots

phpBB is one of the most popular software products for running online forums. As spammers found forums as a fantastic breeding ground for sending their commercial messages, …

Top 10 WordPress Anti Spam Plugins

Blog spam is a huge problem but fortunately protection is available and in a few steps you can make sure you are protected. Check out the plugins below, one of them will …

Richard Rushing, AirDefense CSO, on Wireless Security

At the recent RSA Conference 2007 in San Francisco, AirDefense was doing wireless airwave monitoring. AirDefense found more than half of the 347 wireless devices susceptible …

HNS Podcast: Data Auditing

As founder and Chief Technical Officer, Prat Moghe drives the product vision, technology and market strategy at Tizor Systems. In this podcast, he talks about data auditing. …

Interview with Kurt Sauer, CSO of Skype

As Chief Security Officer at Skype Technologies, Kurt Sauer is focused on delivering trusted communications services via Skype’s platforms. Both the software delivered …

Don't miss

Cybersecurity news