Expert analysis
Exposing Your Life – the Top Facts on PDA Usage
If one in three houses in your street were left with their front doors open at night would you think their owners were asking for trouble? One in three PDA users keep their …
New Automated 802.11 Wireless Security Software From Code Red Systems
A limited free download of the AirBlock 802.11 wireless security software for residential and small business networks has been made available by Code Red Systems, a provider …
Interview with Mohammed J. Kabir, author of the “Red Hat Linux Survival Guide”
Mohammed J. Kabir (prefers to be called Kabir) is the founder and CEO of EVOKNOW, Inc. His company, EVOKNOW, develops email and GIS software. Kabir also leads a consulting …
OpenSSH Buffer Management Vulnerability
Early today we received a note that there are rumblings in the underground related to a new OpenSSH vulnerability. The official web site says that a new version of OpenSSH was …
Wireless Security: Preventing Your Data From Vanishing Into Thin Air
Despite its many exciting possibilities for new business opportunities, cost-savings, and user freedom, wireless technology presents serious challenges to information …
An Integrated Approach to Threat Management
Effective Threat Management embodies the actions organizations must take to defend themselves against today’s ever-present cyber-threats. At a high-level, these actions …
A Walk Through “Sombria”: A Network Surveillance System
Sombria (“shadowy” in Portuguese) is a honeypot system set up in Tokyo, Japan, that is intended for network surveillance and research and not for production …
Interview with John Vacca, information technology consultant and internationally known author
John Vacca is an information technology consultant and internationally known author based in Pomeroy, Ohio. Since 1982, John has authored of 30 books and more than 390 …
Information Security Checklist
Today’s heightened awareness of the need to secure IT infrastructures and protect mission critical data is leading more and more organizations to reevaluate their …
Protecting Databases
One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason …
Prison for computer crime
The Justice Ministers of the 15 Member States of the European Union have decided to modify their country laws, with the aim of including prison sentences for the authors of …
Blindfolded SQL Injection
Until today, exploiting SQL Injection attacks depended on having the Web Server return detailed error messages or having any other source of information. As a result, many …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month