Expert analysis
Why Bother Virus Scanning?
I have always thought the idea of scanning for viruses to be flawed, well certainly as a security measure. Yet nearly all of you reading this article will be relying on just …
SOAP Web Services Attacks
The World Wide Web is being used increasingly for application-to-application communication, thanks to programmatic interfaces known as web services. In conjunction with …
Worms Of The Future: Trying To Exorcise The Worst
This is a research paper on the security (or lack of) within computer systems and ways of improvement with respect to mobile and hostile code such as worms. This paper should …
Flooding From The Underground – A Global Threat
When Khaled Mardam-Bey developed an IRC client for the Windows platform, I doubt he envisaged mIRC becoming the basis for the control of an immeasurable number of compromised …
Microsoft Releases Security Updates For November
These new security updates address newly discovered issues in Microsoft Windows, including Internet Explorer. Two of the updates are ranked as “Critical” while one …
Attacking the DNS Protocol
DNS is a heavily used protocol on the Internet yet has numerous security considerations. This paper whilst containing nothing new on DNS security brings together in one …
Web Application Hacking: Exposing Your Backend
We used to have simple web sites. The web server sent HTML to the browser which displayed it. This was a “brochureware” site; designed for marketing or …
Nessus Scanning on Windows Domain
This paper is about using Nessus to scan Windows networks and various scenarios one might encounter. It does not talk about running Nessus from a Windows machine but on a …
Borderware Announces SteelGate Firewall & VPN Appliance
BorderWare Technologies Inc. released yet another security appliance in a relatively short time. After MXtreme Mail Firewall 3.0 and NameVault DNS Server 3.0 have seen their …
The Anatomy of Cross Site Scripting
Cross site scripting (XSS) flaws are a relatively common issue in web application security, but they are still extremely lethal. They are unique in that, rather than attacking …
SSL VPN Gateways: A New Approach to Secure Remote Access
Introduction Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) are quickly gaining popularity as serious contenders in the remote-access marketplace. Analysts predict …
RSA Security Extends Its Strategic Relationship With Microsoft
The RSA Security booth here in Amsterdam Here at the RSA Conference 2003 in Amsterdam, RSA Security announced an expansion of their relationship with Microsoft as the RSA …
Featured news
Sponsored
Don't miss
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)
- GISEC Global 2024 video walkthrough
- GenAI can enhance security awareness training
- The relationship between cybersecurity and work tech innovation