Expert analysis
Traditional Intrusion Detection Model Outdated and Distracting
The Internet and interoperable intranets are a vast and complex dimension of both enabling and inhibiting data flows. Current generation intrusion detection (ID) systems are …
A Comment on Bugtracking
On November 20, 2000, I was sent an e-mail by someone who called himself Zorgon. It read: CGIForum is a free forum. We can set `thesection’ parameter to view files on …
Issues: “Save a bug, safe a life?”
“And there’s the sign, Ridcully,” said the Dean. “You HAVE read it, I assume. You know? The sign which says “Do not, under any circumstances, …
Hype and the Security Scene: Taking the “rep”
Ever since there has been a “hackerscene” there has been a constant struggle between its “inhabitants” and mainstream media over words. That’s …
Issues: The media’s guide to talking to hackers
HNN published an article called “A hacker’s guide to talking to the media”. It was received with different opinions around the scene (I remember it referred …
The six headed spam monster
Several days ago I visited an on-line forum of one of the Internet Presence Providers (IPP) in my country and found a topic dealing with spam. One user of the IPP in this …
Issues: Hiring hackers, the fine line between cult and criminal
Obviously there are a lot of technically talented individuals running around in the hacking scene nowadays. There always have, it’s the root of its existence. This has …
Issues: The security of electronic banking, legacy of the c0w
Last week, 03-09-00 to be exact, a Dutch television show exposed the Dutch banking organisation ABN AMRO’s HomeNet program as being insecure. Computer science students …
Hype around malicious code for handhelds
The new virus war zone: Your PDA”, “Take care of the Palm virus”, “Virus attacks portable devices” etc – these are titles of some of the …
Featured news
Sponsored
Don't miss
- 100+ domains seized to stymie Russian Star Blizzard hackers
- October 2024 Patch Tuesday forecast: Recall can be recalled
- Best practices for implementing threat exposure management, reducing cyber risk exposure
- Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
- CUPS vulnerabilities could be abused for DDoS attacks