Expert analysis
Patch time: Keeping your system and programs up-to-date
For all computer users, patching is an important aspect of keeping secure online. Need more information on exactly what patching is, why it’s so important, and how to …
A closer look at Tiptoe for Mac OS X
Zenopolis’ Tiptoe is a privacy application for Mac OS X that provides you with a “private browsing” like feature to all sorts of applications and to remove …
Mobilizing a community to fight malware
The word about Immunet’s free anti-virus solution is spreading fast. The agent installed on my computer tells me that there are currently 162,597 people in the Immunet …
Q&A: OWASP AppSec Research
John Wilander is the chapter leader for OWASP Sweden and expert consultant at Omegapoint AB. He’s working professionally in the intersection between software development …
A closer look at EXE Password Protector
Eltima’s EXE Password Protector (v. 1.1.6.214) allows you to password-protect any Windows executable file (excluding only system-critical files which influence Windows …
Rising security threats in 2010
In this podcast, Roel Schouwenberg, Senior Anti-Virus Researcher for Kaspersky Lab, talks about rising security threats in 2010. Using the January attacks against Google and …
Open authentication standards and OATH
In this podcast, Siddharth Bajaj, Principal at Verisign Labs and Chair of the Joint Coordination Committee which leads the Initiative for OATH (Open AuTHentication), talks …
iPhone unlocking tricks get PCs into trouble
A malware-spreading mechanism targeting the “iPhone unlocking” fans goes to prove that cybercrime is never short of imagination. This is how the story goes: you …
Identity Management for the cloud: Taking the next step
Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn’t what most companies really …
Q&A: Cyber warfare
Geoff Harris is the President of the UK Chapter of the Information Systems Security Association (ISSA) a not-for-profit, international organization of information security …
Hacking Web 2.0 JavaScript: Reverse engineering, discovery and revelations
Today, applications are becoming increasingly dependent on the Internet as a foundation platform. As the application domain increases worldwide, the variety of web content …
Web application security issues and solutions
In this video, recorded at RSA Conference 2010, Mandeep Khera from Cenzic talks about web application security issues and solutions. He focuses on the fact that most web …