Please turn on your JavaScript for this page to function normally.
Oracle Database Listener Security Guide

Through our security consultations, we have consistently identified poor Oracle Database Listener (TNS Listener) security as a significant security risk. Few Oracle database …

The Biometrics Myth

First, the good news There are obvious attractions associated with biometric authentication systems. Apart from “looking the part’, users love them. Once enrolled, …

The Corporate Identity Crisis

A recent Cabinet Office report estimates that identity theft costs the U.K. economy more than £1.3 billion per year. This figure seems conservative next to a U.S. Federal …

FreeBSD 5.2 is here

Building upon the success of FreeBSD 5.1, this release includes: Full Tier-1 support for single and multiprocessor AMD Athlon64 and Opteron systems. Dynamically linked root …

Improving Passive Packet Capture: Beyond Device Polling

Passive packet capture is necessary for many activities including network debugging and monitoring. With the advent of fast gigabit networks, packet capture is becoming a …

Security Predictions For 2004

While attending the RSA Conference 2003 in Amsterdam, we met up with some key people in the security industry and asked them to share their thoughts on the future of computer …

Looking Back At Wireless Security In 2003

Wireless security is one of the hottest topics in our business. In the article you are just reading, I’ve tried to cover some of the most interesting wireless security …

Reflecting On Linux Security In 2003

This has been indeed an interesting year for Linux security. The point of this article is to offer a view on what I believe to be some of the most interesting happenings in …

A Look Into The Viruses That Caused Havoc In 2003

In a recently published report by managed e-mail security provider Message Labs, we can see a dramatical increase in e-mail borne viruses – ratio of virus infected …

An In-Depth Look Into Windows Security in 2003

When it comes to security predictions for next year, basically everyone says it’s going to be worst than this year despite the increased spending on security and some …

Top Five Technologies to Fight Spam in 2004

Exchange Server anti-virus and secure content management product provider Nemx Software, published a list of top spam trends and technologies for 2004. In 2004, the threat of …

Interview with Jon Edney, author of “Real 802.11 Security”

Jon Edney specializes in wireless networking and is a key contributor to the development of IEEE 802.11 systems. As a member of the technology consultancy Symbionics Networks, …

Don't miss

Cybersecurity news