Expert analysis
The Biometrics Myth
First, the good news There are obvious attractions associated with biometric authentication systems. Apart from “looking the part’, users love them. Once enrolled, …
The Corporate Identity Crisis
A recent Cabinet Office report estimates that identity theft costs the U.K. economy more than £1.3 billion per year. This figure seems conservative next to a U.S. Federal …
FreeBSD 5.2 is here
Building upon the success of FreeBSD 5.1, this release includes: Full Tier-1 support for single and multiprocessor AMD Athlon64 and Opteron systems. Dynamically linked root …
Improving Passive Packet Capture: Beyond Device Polling
Passive packet capture is necessary for many activities including network debugging and monitoring. With the advent of fast gigabit networks, packet capture is becoming a …
Security Predictions For 2004
While attending the RSA Conference 2003 in Amsterdam, we met up with some key people in the security industry and asked them to share their thoughts on the future of computer …
Looking Back At Wireless Security In 2003
Wireless security is one of the hottest topics in our business. In the article you are just reading, I’ve tried to cover some of the most interesting wireless security …
Reflecting On Linux Security In 2003
This has been indeed an interesting year for Linux security. The point of this article is to offer a view on what I believe to be some of the most interesting happenings in …
A Look Into The Viruses That Caused Havoc In 2003
In a recently published report by managed e-mail security provider Message Labs, we can see a dramatical increase in e-mail borne viruses – ratio of virus infected …
An In-Depth Look Into Windows Security in 2003
When it comes to security predictions for next year, basically everyone says it’s going to be worst than this year despite the increased spending on security and some …
Top Five Technologies to Fight Spam in 2004
Exchange Server anti-virus and secure content management product provider Nemx Software, published a list of top spam trends and technologies for 2004. In 2004, the threat of …
Interview with Jon Edney, author of “Real 802.11 Security”
Jon Edney specializes in wireless networking and is a key contributor to the development of IEEE 802.11 systems. As a member of the technology consultancy Symbionics Networks, …
Airscanner Announces Mobile Encrypter and Discontinuation of Mobile Sniffer
Dallas based Airscanner Corporation, announced the upcoming release of Airscanner Mobile Encrypter beta. The Airscanner Mobile Encrypter is an application that secures the …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on