Expert analysis
The six headed spam monster
Several days ago I visited an on-line forum of one of the Internet Presence Providers (IPP) in my country and found a topic dealing with spam. One user of the IPP in this …
Issues: Hiring hackers, the fine line between cult and criminal
Obviously there are a lot of technically talented individuals running around in the hacking scene nowadays. There always have, it’s the root of its existence. This has …
Issues: The security of electronic banking, legacy of the c0w
Last week, 03-09-00 to be exact, a Dutch television show exposed the Dutch banking organisation ABN AMRO’s HomeNet program as being insecure. Computer science students …
Hype around malicious code for handhelds
The new virus war zone: Your PDA”, “Take care of the Palm virus”, “Virus attacks portable devices” etc – these are titles of some of the …
Featured news
Resources
Don't miss
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)
- Cybercriminals are scaling phishing attacks with ready-made kits
- StackRox: Open-source Kubernetes security platform
- What happens to insider risk when AI becomes a coworker
- Passwords are where PCI DSS compliance often breaks down