Expert analysis
Junking The Junk: Staying Ahead Of Spam Attacks
The numbers speak for themselves: in 2005, junk mail accounted for nearly 60 percent of all emails, up from just 10 per cent in 2001. And this growth looks set to continue. …
Looking Back At Computer Security In 2005
What follows are some of the biggest events of 2005 with comments by (in no particular order): Bruce Schneier – CTO of Counterpane Internet Security and acclaimed …
Social Engineering And Other Threats To Internal Security
Consider the following scenario. A good looking woman is wandering around your premises and approaches you asking to show her how to use some functions in Excel or any other …
Declaration of Rights for Administrators and End Users
One network administrator, Susan Bradley, proposed a “Declaration of Rights for Administrators and End Users,” published recently on Patch Management.org. …
Microsoft Patch Tuesday Brings Two Bulletins
This month’s Bulletins include security updates affecting Microsoft Windows and Microsoft Internet Explorer: Microsoft Security Bulletin MS05-054 – Vulnerabilities …
The Unspoken Taboo – The Never Expiring Password
A few months ago we installed a burglar alarm in our house. The company sent a trustworthy employee to do the installation, and he set the whole thing up for us. With sensors …
Web Application Footprinting & Assessment with MSN Search Tricks
Any search engine database is a very powerful source of information for web applications. The Search Engine’s spiders are well-powered to run frequently on sites and …
HNS Holiday Book Giveaway
The holidays are approaching and we are in a giving mood. We’ve prepared this book giveaway in association with the great folks over at O’Reilly, well known for …
Blocking Skype Using Squid and OpenBSD
After much digging online for an effective way to stop this pesky application that is highly de-centralised and a big pain to blocked, I finally found a way to do it. It has …
The 2005 SANS Top 20 Internet Security Vulnerabilities
Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security …
OATH Announces 2006 Roadmap for Open Authentication
OATH, the Initiative for Open Authentication, today announced the organization’s 2006 technology roadmap that builds upon the technical framework for open authentication …
How To Lock Down Enterprise Data With Infrastructure Services
How do you protect privacy at the level of individual records in applications, databases, and file systems? As data resources become networked in more complex three tier …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)