Expert analysis
As Predicted the Spam Problem Rages
As the experts have been predicting, the spam problem is growing at alarming rates and poses much more than an annoyance to businesses as it clogs networks and drags down …
Interview with John Chirillo, author of “Hack Attacks Testing: How to Conduct Your Own Security Audit”
Who is John Chirillo? How did you gain interest in computer security? Like most computer enthusiasts I began my career early on. At twelve years old I wrote a game entitled …
Warchalking and Other Wireless Worries
Wireless technologies promise increase flexibility but are the security risks worth the benefits? Wired computer networks are costly to install and difficult to change, …
New Apache 2.0.45 Fixes Denial of Service Vulnerability
Newly released Apache HTTP Server 2.0.45, fixes yet unspecified Denial of Service vulnerability. The vulnerability information will be disclosed by iDefense on 8 April 2003. …
Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”
Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A …
LT Auditor+ Security Software Bundled with Novell Netware
Blue Lance announced that a new version of LT Auditor+ has been developed exclusively for Novell and packaged with “Nakoma,” the next official release of NetWare. …
Firewall + Firewall Policy = Improved Security
So far this year analysts, government bodies and even security companies have all stated that Internet security incidents are on the rise. Whether fact or fiction, the truth …
Cyber Terrorism – is it a Serious Threat to Commercial Organizations?
Cyber Terrorism is a hot topic in the popular press and on general Computer industry web sites. Unfortunately, the “hype’ surrounding the topic is actually doing a …
Interview with Sunil James, Manager of iDEFENSE’s Vulnerability Contributor Program
Sunil James manages iDEFENSE’s Vulnerability Contributor Program (VCP). He is a member of the company’s Technical Intelligence team. Sunil joined iDEFENSE in July …
Red Hat Linux 9 has been released
Red Hat, Inc. announced the availability of Red Hat Linux 9. Drawing from the work of the open source community, Red Hat Linux 9 allows users to take advantage of the newest …
The Case For Secure Email
It may not be surprising for you to learn that email is not a secure medium of communication; however, it may surprise you to learn just how inherently insecure it really is …
Interview with Lisa Yeo, author of “Personal Firewalls for Administrators and Remote Users”
Lisa Yeo is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing …
Featured news
Sponsored
Don't miss
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)
- Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
- Who owns customer identity?
- Enterprises face significant losses from mobile fraud
- Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation