Please turn on your JavaScript for this page to function normally.
An Introduction To SQL Injection Attacks For Oracle Developers

Most application developers underestimate the risk of SQL injection attacks against web applications that use Oracle as the back-end database. This paper is intended for …

Spam Might Be Your Biggest Headache, But It’s Not Your Biggest Threat

In the last few years spam has grown exponentially. Despite changes in the law and the introduction of new regulations, junk email continues to flood in, overloading corporate …

An IT Manager’s Insight into Mobile Security

Mobile security is a hot issue, but who is listening? Who really cares? The mere word of security sends most people running. Investing in preventative IT security has never …

Oracle Database Listener Security Guide

Through our security consultations, we have consistently identified poor Oracle Database Listener (TNS Listener) security as a significant security risk. Few Oracle database …

The Biometrics Myth

First, the good news There are obvious attractions associated with biometric authentication systems. Apart from “looking the part’, users love them. Once enrolled, …

The Corporate Identity Crisis

A recent Cabinet Office report estimates that identity theft costs the U.K. economy more than £1.3 billion per year. This figure seems conservative next to a U.S. Federal …

FreeBSD 5.2 is here

Building upon the success of FreeBSD 5.1, this release includes: Full Tier-1 support for single and multiprocessor AMD Athlon64 and Opteron systems. Dynamically linked root …

Improving Passive Packet Capture: Beyond Device Polling

Passive packet capture is necessary for many activities including network debugging and monitoring. With the advent of fast gigabit networks, packet capture is becoming a …

Security Predictions For 2004

While attending the RSA Conference 2003 in Amsterdam, we met up with some key people in the security industry and asked them to share their thoughts on the future of computer …

Looking Back At Wireless Security In 2003

Wireless security is one of the hottest topics in our business. In the article you are just reading, I’ve tried to cover some of the most interesting wireless security …

Reflecting On Linux Security In 2003

This has been indeed an interesting year for Linux security. The point of this article is to offer a view on what I believe to be some of the most interesting happenings in …

A Look Into The Viruses That Caused Havoc In 2003

In a recently published report by managed e-mail security provider Message Labs, we can see a dramatical increase in e-mail borne viruses – ratio of virus infected …

Don't miss

Cybersecurity news