Please turn on your JavaScript for this page to function normally.
The evolving nature of hacktivism

A recent Anonymous video admits that they’ve been fairly quiet lately. From an American and Western European perspective, this is somewhat true. In 2010, Anonymous built …

10 steps to ensure users only access what they need

Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …

Burning enterprise authentication issues

Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information – whether its …

Hardening Windows processes

Didier Stevens is an IT security consultant working for a large financial corporation in Belgium. In this video recorded at Hack in The Box 2012 Amsterdam, Didier talks about …

Vulnerability disclosure framework for industrial control systems

The Industrial Control Systems Joint Working Group (ICSJWG) published “The Industrial Control Systems Common Vulnerability Disclosure Framework”, which is a …

Modern day pirates

Many of you will remember long summer days with the streets filled with laughing children congregating to play football or just hang out with their friends – I certainly …

Overcoming the hacker hurdle during the Olympics

During the Beijing Olympics it’s reported there were upwards of 12 million “cyber security incidents” per day . Hacking has evolved tremendously since …

Five steps for a secure cloud transition

Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest …

What’s going on with the Cybersecurity Act of 2012?

This week we have witnessed a heated debate between US Senators who showed opposite opinions on the Cybersecurity Act of 2012, a bill aimed at regulating a number of important …

IPv6 and click fraud

The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …

Do you need a honeypot?

It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …

Exploring the world of digital forensics

Jess Garcia, founder of One eSecurity, is a senior security engineer and an active security researcher in areas of incident response, computer forensics and honeynets. In this …

Don't miss

Cybersecurity news