Please turn on your JavaScript for this page to function normally.
IT threats in 2006

The year that is just coming to an end has marked a turning point with respect to Internet threats. The last 12 months have been notable for the absence of the kind of massive …

Junking The Junk: Staying Ahead Of Spam Attacks

The numbers speak for themselves: in 2005, junk mail accounted for nearly 60 percent of all emails, up from just 10 per cent in 2001. And this growth looks set to continue. …

Looking Back At Computer Security In 2005

What follows are some of the biggest events of 2005 with comments by (in no particular order): Bruce Schneier – CTO of Counterpane Internet Security and acclaimed …

Social Engineering And Other Threats To Internal Security

Consider the following scenario. A good looking woman is wandering around your premises and approaches you asking to show her how to use some functions in Excel or any other …

Declaration of Rights for Administrators and End Users

One network administrator, Susan Bradley, proposed a “Declaration of Rights for Administrators and End Users,” published recently on Patch Management.org. …

Microsoft Patch Tuesday Brings Two Bulletins

This month’s Bulletins include security updates affecting Microsoft Windows and Microsoft Internet Explorer: Microsoft Security Bulletin MS05-054 – Vulnerabilities …

The Unspoken Taboo – The Never Expiring Password

A few months ago we installed a burglar alarm in our house. The company sent a trustworthy employee to do the installation, and he set the whole thing up for us. With sensors …

Web Application Footprinting & Assessment with MSN Search Tricks

Any search engine database is a very powerful source of information for web applications. The Search Engine’s spiders are well-powered to run frequently on sites and …

HNS Holiday Book Giveaway

The holidays are approaching and we are in a giving mood. We’ve prepared this book giveaway in association with the great folks over at O’Reilly, well known for …

Blocking Skype Using Squid and OpenBSD

After much digging online for an effective way to stop this pesky application that is highly de-centralised and a big pain to blocked, I finally found a way to do it. It has …

The 2005 SANS Top 20 Internet Security Vulnerabilities

Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security …

OATH Announces 2006 Roadmap for Open Authentication

OATH, the Initiative for Open Authentication, today announced the organization’s 2006 technology roadmap that builds upon the technical framework for open authentication …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools