Expert analysis
Managing the Impact of Academic Research on Industry/Government: Conflict or Partnership?
In the world of Information Security, there is great potential for conflict between the research aims of academics on the one hand, and the interests of industry and …
Recover Passwords Using the Power of Multiple Computers
Elcomsoft Distributed Password Recovery offers administrators a comprehensive solution for recovering passwords to MS-Office documents when employees forget their passwords, …
Coping with A Major Security Breach? What’s your Contingency Plan?
Legal pressures, not to mention your moral obligation to assist unwitting victims, means that you should never delay when disclosing IT security incidents. In November 2005 a …
Experts Comment On The Top Security Threats In 2006
At the Infosecurity Europe 2006 Press Conference a panel of speakers from MessageLabs, Centennial Software, (ISC)2, Black Spider, Juniper Networks and Insight Consulting …
Microsoft Talks About Security Developments
Microsoft realized that phishing, pharming, botnets and rootkits show that attacks are becoming more sophisticated. This situation makes traditional defenses to be inadequate …
Convergence And The Rise Of Botnets
At the recent Infosecurity Press Conference in London, Mark Sunner, CTO of MessageLabs, presented the results of the MessageLabs Intelligence Annual Report that provides us …
Computer Security Today: A Report From The Infosecurity Europe 2006 Press Conference
Infosecurity Europe 2006 is just around the corner. Taking place at the Olympia in London 25-27 April 2006, it is the most important gathering of security professionals in …
MSNPawn – Footprinting, Profiling and Assessment with MSN Search
Any search engine database is a very powerful source of information for web applications. We are interested in the searching interface and criteria these engines provide. Now, …
MP3s – The Big Security Risk In 2006
Once again the problem of mobile device security is raising its head. Yet that is the world we live in. Like it or not, the miniaturisation of disk storage technology means …
New FBI Computer Crime Survey
Want insight into the cyber attacks that U.S. organizations are facing, what defenses they’re using against these assaults, and the implications for industry and …
Tips For Staying Secure in 2006
So 2005 has gone down as the worst year for data security breaches. I suppose the good news is that we seemed to be less troubled by viruses, so either the virus developers …
Malware – Future Trends
Malware has truly evolved during the last couple of years. Its potential for financial and network based abuse was quickly realized, and thus, tactics changed, consolidation …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month