Expert analysis
Step-by-step Guide to Online Amazon S3 Backups with Jungle Disk
Jungle Disk is an application that lets you store files and backup data securely to Amazon.com’s S3 Storage Service. Amazon S3 provides a simple web services interface …
PDF Spam: A Step Ahead of Image Spam
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the …
Guide to Online Antivirus Solutions Part 2: Trend Micro HouseCall
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Quantitative Look at Penetration Testing
Since 2004 Matta has been running a project to test the technical competence of security consultants. With probably the largest collection of data on the methodology’s …
Manage Your Passwords with 1Passwd
Nowadays everyone has too many passwords to remember. People either use easy to remember passwords or even worse, the same password for multiple accounts. 1Passwd makes things …
The Story of DEFCON
Jeff Moss aka Dark Tangent, the founder of DEFCON and Black Hat, tells the history of the largest hacker conference and how it all got started. Find out more about the early …
Guide to Online Antivirus Solutions: NanoScan and TotalScan
Internet connections are getting faster every day, so online antivirus solutions have transformed from proof-of-concept into actual quality security services. I’ve been …
Top 5 Security and Networking Widgets for Mac OS X
This article presents 5 widgets that that enable you to perform various tasks quickly, straight off the Dashboard. AirTrafficControl AirTrafficControl is the most advanced …
Lock the Door and Make Sure Your Data is Protected
You would think that at some point in time your children will reach the age at which you can reason with them, I’m hoping it’s a year older than the oldest one is …
The Rules for Computer Forensics
The recovery of evidence from electronic devices is fast becoming another component of many the IT Manager’s remit. Electronic evidence gathered is often valuable …
How To Recover Forgotten Microsoft Word Passwords
Microsoft Office applications have an option for setting up different levels of passwords. They can be used for specific actions such as preventing reading, writing or adding …
Web Vulnerabilities in the Age of the iPhone
I’ve read lots of articles about hacking the iPhone lately. They’re mostly focused on exploring the hardware, circumventing the intended activation process, or …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)