Expert analysis
A Security Focus on China Outsourcing
Business process outsourcing (BPO), such credit card transactions, medical claims data entry and financial transactions, has been around for a number of years. The act of …
High-Level Reverse Engineering
This paper aims to present a methodical framework for high-level reverse engineering. The methodology is a culmination of existing tools and techniques within the IT security …
Removable Devices: The Menace Within
Handheld USB devices have been a godsend to anyone who wants to take information from one PC to another, but their ease of use also has created a new type of security headache …
The Federal Bureau of Investigation – Capabilities and Service
The Federal Bureau of Investigation (FBI) is an elite law enforcement organization. This article provides an overview of FBI teams, InfraGard and the FBI Citizens’ …
Guide to Online Antivirus Solutions Part 8: CA Online Virus Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Attacking the Build through Cross-Build Injection
A poorly designed software build process can allow an attacker to insert malicious code into the final product or to take control of a build machine. This paper surveys …
Mac Security Freeware: Password Manager, Screen Locker and MD5 Checksum Checker
In a series of articles on Mac security freeware I will be covering a number of newly released security tools for Mac OS X. This time I am taking a look at KeyMaster 1.0.1 …
Solving the Keylogger Conundrum
The geek shall inherit the earth! This is the slogan that has reverberated out from Silicon Valley from the mid-90s, as we all realized that technology was, actually, fun, …
Beware the Default Password
During the course of a recent security audit I was rather surprised to find a critical system still running with a default password. The default password has long been the bug …
Guide to Online Antivirus Solutions Part 7: F-Secure Online Virus Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Critical Steps to Secure Your Virtualized Environment
Virtualization is one of the hottest technologies in the data center today, and with good reason. The benefits are clear. Virtualization can help reduce the physical space of …
Interview with Jeremiah Grossman, CTO of WhiteHat Security
Jeremiah Grossman founded WhiteHat Security in 2001. Prior to WhiteHat, he was an Information Security Officer at Yahoo! responsible for performing security reviews on the …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month