Please turn on your JavaScript for this page to function normally.
Hacking Unified Communications security

A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …

Application security vulnerabilities

Rafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only …

Feedback loops in the fight against spam

Nearly everybody gets spam. But do you ever wonder what happens when you click that ‘Report Spam’ button on your mail reader? Does it do anything useful, or is it …

A closer look at Disk Drill PRO

Disk Drill PRO (v1.2.97) is a Mac data recovery software that recovers data from HFS/HFS+, FAT, NTFS and other file systems. Disk Drill locates and recovers deleted files from …

The smartphone: A real bug in your bed

The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …

IPv6 reputation is doable

The Internet has grown beyond what anybody involved in its early development could have imagined. Who would have thought that a network developed in the 1970s for government …

Security auditing tools and challenges

James Tarala is a principal consultant with Enclave Security. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor …

Web application security trends and issues

In this podcast, Mandeep Khera from Cenzic talks about web application security trends and issues. Web applications are the weakest link in the security chain – and it …

How secure is your browser?

Qualys CTO Wolfgang Kandek talks about research which clearly shows that browser security is alarmingly bad. Browsers and plug-ins are frequently outdated and easily attacked. …

The expanding role of digital certificates… in more places than you think

A scribbled signature may have been enough to verify your identity 20 years ago, but today’s online world requires more advanced — and authenticated or encrypted — …

Five security secrets your IT administrators don’t want you to know

As valued members of your organization, IT administrators work every day to keep your infrastructure up and available. But in today’s rush to contain operational costs, …

A closer look at MacKeeper

MacKeeper (v1.0.3.) is a comprehensive bundle of various system utilities that will help you keep your Mac secure from malware; find it if it gets stolen; backup, restore, …

Don't miss

Cybersecurity news