Please turn on your JavaScript for this page to function normally.
21st Century Infamous Competitions

As all true fans of Westerns know, any bad guy worth his salt will have a score of notches marked on the butt of his revolver: each notch symbolizing another tombstone …

Trustix Secure Linux 2.0 Announced

After a number of technology preview (announcements: TP1 and TP2) and beta versions (announcements: Beta 2 and Beta 3), Trustix Secure Linux announced the release of Trustix …

Sony alerts consumers of fraudulent spam e-mail

Sony Electronics reported that it has become aware of an unauthorized and deceptive spam e-mail that has been sent to consumers with the subject title “Sonystyle user …

Exploitation of data streams authorized by a network access control system for arbitrary data transfers: tunneling and covert channels over the HTTP protocol

This paper presents various concepts to researchers and NACS administrators to explain that each time an administrator thinks he only allows the HTTP protocol to get in and …

Prophylactic Data Security?

The industry is being pulled in two directions – the need to proliferate access to corporate data – everything from global trials to Internet therapy portals …

Interview with Brian Hatch, author of “Hacking Exposed Linux”

Who is Brian Hatch? Introduce yourself to our readers. Brian Hatch is a hacker in the positive sense – a coder, tinkerer, and tester. I love to prod software into doing …

Conference on Mobile and Wireless Security Announced

MIS Training Institute announced that The Conference on Mobile and Wireless Security will be held in Chicago, IL, September 23-25, 2003, with optional workshops on September …

Aladdin Knowledge Systems launches new advanced anti-spam service

Aladdin Knowledge Systems announced its collaboration with Cobion, technology leader in content security software, and the launching of a new Advanced Anti-spam Service …

Outsourcing – Potential Security Nightmare?

The outsourcing graveyard is littered with companies that “almost’ took the plunge. A recent case in point involves a major British performance-car manufacturer …

Interview with Kevin Day, author of “Inside the Security Mind: Making the Tough Decisions”

Who is Kevin Day? Introduce yourself to our readers. I grew up in Northern California, as the son of an early programmer I held a pacifier in one hand and a keyboard in the …

Why Managed Security Services are so Popular in Financial Institutions

‘Managed Security Services’ seems to be one of the new buzzwords in the ICT sector. When signing up with a Managed Security Service Provider (MSSP), this company …

Basic Security Measures for FreeBSD

Introduction This document will describe the basic security measures that should be applied to a FreeBSD 4.x workstation. Mostly all of these measures should be applied in a …

Don't miss

Cybersecurity news