Expert analysis
The changing face of web security
Are we winning or losing the battle of web security? Read this white paper backed by industry figures to ensure you are aware of the facts. Download the paper in PDF format here.
What makes a good Password?
The first thing to understand, is what makes a bad password. The worst passwords are: password, 111111, fred, master, boss and whatever is the name of your …
An introduction to PKI
This guide provides the reader with a basic introduction to key terms and concepts used in a PKI including Certificates, Keys and Authorities. It mentions the features and …
Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection
Wireless LAN discovery through the use of applications such as NetStumbler, DStumbler, Wellenreiter and others is an increasingly popular technique for network penetration. …
Timing the Application of Security Patches for Optimal Uptime
Security vulnerabilities are discovered, become publicly known, get exploited by attackers, and patches come out. When should one apply security patches? Patch too soon, and …
Host Discovery with nmap
As a Computer Security Engineer that regularly conducts external penetration tests, a recurring challenge seems to arise when assessing organizations with a large allocation …
Vulnerabilities in Microsoft’s Java implementation
Overview Microsoft Internet Explorer comes with Java virtual machine and accompanying class packages. Multiple security vulnerabilities have been found in the Java …
New NetScreen-5XT features increase security for remote sites
NetScreen Technologies, Inc. has announced new features for the NetScreen-5XT that will increase the level of security provided for companies looking needing a secure way of …
Nokia focuses on privacy, mobile Web services and security tools
Nokia introduced tools for managing subscriber privacy, mobile Web service interfaces and presence management enabling operators to enhance the service offering for their …
Sophos Anti-Virus detection: a technical overview
This paper describes the main components of Sophos Anti-Virus and how they relate to each other. It discusses virus scanning, detection methods and the creation of virus …
The problems with Secure Email
Find out why “Silver Bullet” Email security is problematic. Learn to fully protect your data simply and securely while avoiding complex interactions between …
“Keeping Secure – Managing Cyberspace Security Risk” webcast
Date:Wednesday, December 4, 2002 Time:2:00PM EST (U.S.) Speakers:Mark Cox, Senior Director of Engineering Response Team Lead; Brian Faustyn, Red Hat Network Product Manager …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month