Expert analysis
Looking Back At Wireless Security In 2003
Wireless security is one of the hottest topics in our business. In the article you are just reading, I’ve tried to cover some of the most interesting wireless security …
Reflecting On Linux Security In 2003
This has been indeed an interesting year for Linux security. The point of this article is to offer a view on what I believe to be some of the most interesting happenings in …
A Look Into The Viruses That Caused Havoc In 2003
In a recently published report by managed e-mail security provider Message Labs, we can see a dramatical increase in e-mail borne viruses – ratio of virus infected …
An In-Depth Look Into Windows Security in 2003
When it comes to security predictions for next year, basically everyone says it’s going to be worst than this year despite the increased spending on security and some …
Top Five Technologies to Fight Spam in 2004
Exchange Server anti-virus and secure content management product provider Nemx Software, published a list of top spam trends and technologies for 2004. In 2004, the threat of …
Interview with Jon Edney, author of “Real 802.11 Security”
Jon Edney specializes in wireless networking and is a key contributor to the development of IEEE 802.11 systems. As a member of the technology consultancy Symbionics Networks, …
Airscanner Announces Mobile Encrypter and Discontinuation of Mobile Sniffer
Dallas based Airscanner Corporation, announced the upcoming release of Airscanner Mobile Encrypter beta. The Airscanner Mobile Encrypter is an application that secures the …
The Virus That Came From Outer Space
An American website has published a warning of the possible appearance of a virus from outer space. No, it’s not a joke. The claim was made by Richard Carrigan, a …
“Sombria:” A Witness to Potential Cyber Crimes
The second report of Sombria provides a more succinct and focused overview of the main events “witnessed” by the honeypot system during the months of August, …
Packet Sniffing on Layer 2 Switched Local Area Networks
Packet sniffing is a technique of monitoring network traffic. It is effective on both switched and nonswitched networks. In a non-switched network environment packet sniffing …
Hackproofing DB2
The main points of this presentation are: The state of DB2 security Secure configuration of DB2 Securing DB2 in a Web application Database vulnerabilities Download the …
Overview of Virus Bulletin December 2003 Issue
The December issue of Virus Bulletin magazine starts with an editorial written by the magazine’s new Technical Editor Morton Swimmer. In his first commentary piece, Mr. …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month