Expert analysis
SSL and the Internet: Where is it all going wrong?
Making sure that a web site is installed, configured and working correctly can be a daunting job for even the most experienced IT security professional. One of the most …
The dark side of the new Android Market
A new version of the Android Market has just been launched, making it possible for every device owner to look for applications, buy or even remotely install apps to an Android …
IT governance and mobile technology
The mobile world is undergoing explosive growth. Luckily, enterprises are beginning to realize the potential gains and losses this technology offers, enabling them to act …
Changing the status quo for security
When a problem is recognized that impacts virtually everyone and a group of experts provides a solution, what can possibly prevent the solution from being used? If the problem …
The vulnerability species: Origin and evolution
There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …
Endpoint security: The year ahead
Predicting the distant future of IT security is tricky, but the near future – the next 12 to 18 months – is a little easier. After all, the seeds of what is to …
A closer look at avast! Free Antivirus
Avast! Free Antivirus (v.5.1.864) is an anti-virus, anti-spyware software with boot-time scanning capabilities. It also incorporates anti-rootkit and strong self-protection …
A closer look at Steganos Privacy Suite
Steganos Privacy Suite (v.12) is a suite offering most Steganos privacy and encryption products bundled up together: Safe, Portable Safe, Crypt & Hide, Password Manager, …
The criminal in your browser is real
Evidence is everywhere that cyber criminals exist, and they’re able to make a substantial living from their illegal activities. While it is true that many are focusing …
Cisco IOS penetration testing with Metasploit
The Metasploit Framework and the commercial Metasploit products have always provided features for assessing the security of network devices. With the latest release, we took …
5 steps to detect and prevent fraud in the public sector
Where there is money, there is the potential for misappropriation or misuse – intentional or otherwise. Nowhere is this more apparent than in governments where funds are …
The importance of identity in the digital age
In the past decade our identity has undeniably evolved, we’re preoccupied with identity theft and authentication issues, while governments work to adopt open identity …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)