Expert analysis
IT threats in 2006
The year that is just coming to an end has marked a turning point with respect to Internet threats. The last 12 months have been notable for the absence of the kind of massive …
Junking The Junk: Staying Ahead Of Spam Attacks
The numbers speak for themselves: in 2005, junk mail accounted for nearly 60 percent of all emails, up from just 10 per cent in 2001. And this growth looks set to continue. …
Looking Back At Computer Security In 2005
What follows are some of the biggest events of 2005 with comments by (in no particular order): Bruce Schneier – CTO of Counterpane Internet Security and acclaimed …
Social Engineering And Other Threats To Internal Security
Consider the following scenario. A good looking woman is wandering around your premises and approaches you asking to show her how to use some functions in Excel or any other …
Declaration of Rights for Administrators and End Users
One network administrator, Susan Bradley, proposed a “Declaration of Rights for Administrators and End Users,” published recently on Patch Management.org. …
Microsoft Patch Tuesday Brings Two Bulletins
This month’s Bulletins include security updates affecting Microsoft Windows and Microsoft Internet Explorer: Microsoft Security Bulletin MS05-054 – Vulnerabilities …
The Unspoken Taboo – The Never Expiring Password
A few months ago we installed a burglar alarm in our house. The company sent a trustworthy employee to do the installation, and he set the whole thing up for us. With sensors …
Web Application Footprinting & Assessment with MSN Search Tricks
Any search engine database is a very powerful source of information for web applications. The Search Engine’s spiders are well-powered to run frequently on sites and …
HNS Holiday Book Giveaway
The holidays are approaching and we are in a giving mood. We’ve prepared this book giveaway in association with the great folks over at O’Reilly, well known for …
Blocking Skype Using Squid and OpenBSD
After much digging online for an effective way to stop this pesky application that is highly de-centralised and a big pain to blocked, I finally found a way to do it. It has …
The 2005 SANS Top 20 Internet Security Vulnerabilities
Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security …
OATH Announces 2006 Roadmap for Open Authentication
OATH, the Initiative for Open Authentication, today announced the organization’s 2006 technology roadmap that builds upon the technical framework for open authentication …
Featured news
Resources
Don't miss
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed