Please turn on your JavaScript for this page to function normally.
OpenSSH Buffer Management Vulnerability

Early today we received a note that there are rumblings in the underground related to a new OpenSSH vulnerability. The official web site says that a new version of OpenSSH was …

Wireless Security: Preventing Your Data From Vanishing Into Thin Air

Despite its many exciting possibilities for new business opportunities, cost-savings, and user freedom, wireless technology presents serious challenges to information …

An Integrated Approach to Threat Management

Effective Threat Management embodies the actions organizations must take to defend themselves against today’s ever-present cyber-threats. At a high-level, these actions …

A Walk Through “Sombria”: A Network Surveillance System

Sombria (“shadowy” in Portuguese) is a honeypot system set up in Tokyo, Japan, that is intended for network surveillance and research and not for production …

Interview with John Vacca, information technology consultant and internationally known author

John Vacca is an information technology consultant and internationally known author based in Pomeroy, Ohio. Since 1982, John has authored of 30 books and more than 390 …

Information Security Checklist

Today’s heightened awareness of the need to secure IT infrastructures and protect mission critical data is leading more and more organizations to reevaluate their …

Protecting Databases

One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason …

Prison for computer crime

The Justice Ministers of the 15 Member States of the European Union have decided to modify their country laws, with the aim of including prison sentences for the authors of …

Blindfolded SQL Injection

Until today, exploiting SQL Injection attacks depended on having the Web Server return detailed error messages or having any other source of information. As a result, many …

SCO vs. IBM

SCO’s lawsuit against IBM and SCO’s demanding money from companies using Linux has caused some using Linux to worry that this wonderful “too good to be …

St. Bernard Announces E-mail Filtering Appliance

San Diego based St. Bernard Software Inc., announced ePrism Mail Filter – their new e-mail filtering appliance featuring a full combo of e-mail security, spam …

NIST to Host a Biometrics Conference

The National Institute of Standards and Technology is holding the Biometric Consortium’s fall conference, BC 2003, to showcase recent advances in the field and examine …

Don't miss

Cybersecurity news