Expert analysis
Palm i705 Available With Go.Web OnPrem Security Solution
GoAmerica, Inc., a leading developer of wireless data technology announced that it has integrated Go.Web OnPrem with Palm’s i705 handheld. By offering the popular Palm …
mi2g Intelligence Briefing: “Brazil exports Cyber-crime”
According to mi2g reports, one of the largest “cyber crime exporters” in the world is Brasil. The top ten most active defacing groups in November 2002 are all …
Web Application Security Software CodeSeeker Goes Open Source
Butterfly Security, a developer of web application security infrastructure software, announced today the open source release of its web application security software …
Interview with Lance Spitzner, Security Expert
Lance Spitzner is a geek who constantly plays with computers, especially network security. His passion is researching honeypot technologies and using them to learn more about …
Improvements to Microsoft Security Reponse Communications
Steve Lipner, Director of Security Assurance at Microsoft, posted a message to the Security Notification mailing list about some new changes in the communications practices …
Trustix Secure Linux 2.0 Technology Preview 1 Released
Trustix team announced that Trustix Secure Linux 2.0 Technology Preview 1 (aka Rainstorm) is available for download. As this is a technology preview, it is not intended for …
AirDefense Wireless LAN Security to Deflect and Trap Intruders
AirDefense Inc. has introduced a new element to wireless LAN security with the launch of its ActiveDefense, a security appliance that shields 802.11 wireless LANs from …
Security holes… Who cares?
We report on an observational study of user response following the OpenSSL remote buffer overflows of July 2002 and the worm that exploited it in September 2002. Immediately …
Spoofing – Arts of attack and defense
How to spot and avoid potential spoof atacks. Covers DNS spoofing, IP address spoofing, email address spoofing, link alteration, name similarity and content theft. Download …
Explaining Encryption
Make any enquiry about computer security, and you will almost immediately fall over the terms cryptography and encryption (and also decryption), but what exactly is meant by …
How do you deal with Internet fraud?
This paper covers fraud that uses Internet technology as an integral part of the fraud and fraud that is already taking place by other means where the Internet is merely …
Bind Security Vulnerabilities Roundup
1) Original advisory on this topic 2) Vendor response (Internet Software Consortium) 3) Security advisories by Linux vendors 4) Additional information Original advisory on …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations