Expert analysis
Authentication – who’s site is it really?
There are many issues in the business of authentication, and methods by which it is achieved, that are worth discussing at some length, but that is not the topic of this paper …
“Secure E-Mail and Document Delivery” web seminar
On Wednesday December 18 2002, ZixCorp will host a web seminar titled “Secure E-Mail and Document Delivery – Protecting Content, Authenticating Users”. Joyce …
Interview with Jacob Carlson, co-author of “Internet Site Security”
Jacob Carlson is a senior security engineer for TrustWave Corporation. His primary role is leading the penetration testing and vulnerability assessment team. In his copious …
Critical Microsoft Vulnerability Announced
In the 65th Security Bulletin this year, Microsoft announced a critical vulnerability in Microsoft Data Access Components, a collection of components used to provide database …
Palm i705 Available With Go.Web OnPrem Security Solution
GoAmerica, Inc., a leading developer of wireless data technology announced that it has integrated Go.Web OnPrem with Palm’s i705 handheld. By offering the popular Palm …
mi2g Intelligence Briefing: “Brazil exports Cyber-crime”
According to mi2g reports, one of the largest “cyber crime exporters” in the world is Brasil. The top ten most active defacing groups in November 2002 are all …
Web Application Security Software CodeSeeker Goes Open Source
Butterfly Security, a developer of web application security infrastructure software, announced today the open source release of its web application security software …
Interview with Lance Spitzner, Security Expert
Lance Spitzner is a geek who constantly plays with computers, especially network security. His passion is researching honeypot technologies and using them to learn more about …
Improvements to Microsoft Security Reponse Communications
Steve Lipner, Director of Security Assurance at Microsoft, posted a message to the Security Notification mailing list about some new changes in the communications practices …
Trustix Secure Linux 2.0 Technology Preview 1 Released
Trustix team announced that Trustix Secure Linux 2.0 Technology Preview 1 (aka Rainstorm) is available for download. As this is a technology preview, it is not intended for …
AirDefense Wireless LAN Security to Deflect and Trap Intruders
AirDefense Inc. has introduced a new element to wireless LAN security with the launch of its ActiveDefense, a security appliance that shields 802.11 wireless LANs from …
Security holes… Who cares?
We report on an observational study of user response following the OpenSSL remote buffer overflows of July 2002 and the worm that exploited it in September 2002. Immediately …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025