Expert analysis
MSNPawn – Footprinting, Profiling and Assessment with MSN Search
Any search engine database is a very powerful source of information for web applications. We are interested in the searching interface and criteria these engines provide. Now, …
MP3s – The Big Security Risk In 2006
Once again the problem of mobile device security is raising its head. Yet that is the world we live in. Like it or not, the miniaturisation of disk storage technology means …
New FBI Computer Crime Survey
Want insight into the cyber attacks that U.S. organizations are facing, what defenses they’re using against these assaults, and the implications for industry and …
Tips For Staying Secure in 2006
So 2005 has gone down as the worst year for data security breaches. I suppose the good news is that we seemed to be less troubled by viruses, so either the virus developers …
Malware – Future Trends
Malware has truly evolved during the last couple of years. Its potential for financial and network based abuse was quickly realized, and thus, tactics changed, consolidation …
Interview with Dr. Horst Joepen, Senior Vice President Strategic Alliances CyberGuard
In your opinion, what is the single biggest security threat on the Internet today? This is exactly the problem: there is no single biggest threat, but a huge and ever growing …
Florida Spammer Receives 6.5 Billion Pounds Fine
According to media reports, an US-based ISP has been awarded the amount of 6.5 billion pounds in a judgement against a Florida man who sent millions of unsolicited spam …
Why Asset-Based Security Makes Sense
On November 22, 2005, the SANS Institute released its annual report of the top 20 vulnerabilities of the year. As has been noted elsewhere in the security industry, the 2005 …
Denial of service in the BlackBerry browser
A vulnerability has been detected in the browser in BlackBerry devices, which could allow remote attackers to cause denial of service conditions. BlackBerry has released the …
People Power Combats Cyber Fraud
Like so many other aspects of our lives, major fraud has gone high tech. In fact, fuelled by excited media comment, computer crime and fraud are regarded as synonymous by …
IT threats in 2006
The year that is just coming to an end has marked a turning point with respect to Internet threats. The last 12 months have been notable for the absence of the kind of massive …
Junking The Junk: Staying Ahead Of Spam Attacks
The numbers speak for themselves: in 2005, junk mail accounted for nearly 60 percent of all emails, up from just 10 per cent in 2001. And this growth looks set to continue. …
Featured news
Resources
Don't miss
- Securing the invisible: Supply chain security trends
- Why cyber resilience must be part of every organization’s DNA
- 44% of the zero-days exploited in 2024 were in enterprise solutions
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group