Expert analysis
Taking the shield to protect mobile computing
Technology has come a long way in the last 850 years, but we can still learn a thing or two from our medieval ancestors. Take security, for example. After the Norman conquest …
Visualizing compiled executables for malware analysis
Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that …
A closer look at Lavasoft Ad-Aware Free 8.1.0
Ad-Aware Free is the basic, home-use-only version of Lavasoft’s popular anti-spyware and anti-malware tool. To name just a few of its new features: Genotype detection …
ExcaliburCon
In this video, recorded at BruCON, security professional and book author Jayson Street discusses the upcoming ExcaliburCon conference taking place in Wuxi, China. The …
A checklist for guarding against cache poisoning attacks
When reviewing your network infrastructure, don’t forget about that most arcane of networking technologies, the Domain Name System. A compromise of your name servers …
A closer look at GFI Backup 2009 – Home Edition 3.0
GFI Backup 2009 – Home Edition is a free backup software solution that allows you to backup all your documents, photos, music, e-mails and program settings using a …
Q&A: Worldwide surveillance and filtering
The aim of the OpenNet Initiative is to investigate, expose and analyze Internet filtering and surveillance practices in a credible and non-partisan fashion. Rafal Rohozinski …
Online backup or cloud recovery?
Backing up files and data online has been around for quite a while, but it has never really taken off in a big way for business customers. There is also a new solution coming …
10 add-ons for Firefox: Privacy and security
For all of you Firefox users out there, here is a list of handy plug-ins and add-ons that will help you anonymize your Web presence, protect you from loss of passwords, …
Data leakage plan of action
Tiny computing and storage devices have revolutionized the way people carry information as they can stow the equivalent of millions of pages of data. Yet this benefit is also …
A closer look at Microsoft Security Essentials
Microsoft has released a free (for personal use) anti-malware service that protects against viruses, spyware and other malicious software. Security Essentials is designed to …
Five best practices for mitigating insider breaches
Mismanagement of processes involving privileged access, privileged data, or privileged users poses serious risks to organizations. Such mismanagement is also increasing …