Please turn on your JavaScript for this page to function normally.
Junking The Junk: Staying Ahead Of Spam Attacks

The numbers speak for themselves: in 2005, junk mail accounted for nearly 60 percent of all emails, up from just 10 per cent in 2001. And this growth looks set to continue. …

Looking Back At Computer Security In 2005

What follows are some of the biggest events of 2005 with comments by (in no particular order): Bruce Schneier – CTO of Counterpane Internet Security and acclaimed …

Social Engineering And Other Threats To Internal Security

Consider the following scenario. A good looking woman is wandering around your premises and approaches you asking to show her how to use some functions in Excel or any other …

Declaration of Rights for Administrators and End Users

One network administrator, Susan Bradley, proposed a “Declaration of Rights for Administrators and End Users,” published recently on Patch Management.org. …

Microsoft Patch Tuesday Brings Two Bulletins

This month’s Bulletins include security updates affecting Microsoft Windows and Microsoft Internet Explorer: Microsoft Security Bulletin MS05-054 – Vulnerabilities …

The Unspoken Taboo – The Never Expiring Password

A few months ago we installed a burglar alarm in our house. The company sent a trustworthy employee to do the installation, and he set the whole thing up for us. With sensors …

Web Application Footprinting & Assessment with MSN Search Tricks

Any search engine database is a very powerful source of information for web applications. The Search Engine’s spiders are well-powered to run frequently on sites and …

HNS Holiday Book Giveaway

The holidays are approaching and we are in a giving mood. We’ve prepared this book giveaway in association with the great folks over at O’Reilly, well known for …

Blocking Skype Using Squid and OpenBSD

After much digging online for an effective way to stop this pesky application that is highly de-centralised and a big pain to blocked, I finally found a way to do it. It has …

The 2005 SANS Top 20 Internet Security Vulnerabilities

Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security …

OATH Announces 2006 Roadmap for Open Authentication

OATH, the Initiative for Open Authentication, today announced the organization’s 2006 technology roadmap that builds upon the technical framework for open authentication …

How To Lock Down Enterprise Data With Infrastructure Services

How do you protect privacy at the level of individual records in applications, databases, and file systems? As data resources become networked in more complex three tier …

Don't miss

Cybersecurity news