Expert analysis
Video: Overview of RSA Conference Europe 2009
In this video, RSA Conference Europe 2009 Manager Linda Lynch gives an overview of the event, taking place October 20-22 in London, UK.
How social networking can hurt you
Let’s put aside all the positive reasons to use social networking services and focus on the dark side. Most of the time, users don’t even realize how much private …
The future of information security is now
The information security industry is one of the very few that hasn’t been severely impacted by the economic downturn. Many companies in this sector have thrived in the …
Q&A: Mac OS X security and forensics
Sean Morrissey is currently employed by Paradigm Solutions as a Computer Forensic Analyst at the U.S. Department of State and was previously employed by CSC as a …
10 IT security growth areas for 2010
Overall, the recession is likely to be a major factor in IT security purchasing decisions in the next year, with companies looking for solutions which will reduce ongoing …
Taking the shield to protect mobile computing
Technology has come a long way in the last 850 years, but we can still learn a thing or two from our medieval ancestors. Take security, for example. After the Norman conquest …
Visualizing compiled executables for malware analysis
Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that …
A closer look at Lavasoft Ad-Aware Free 8.1.0
Ad-Aware Free is the basic, home-use-only version of Lavasoft’s popular anti-spyware and anti-malware tool. To name just a few of its new features: Genotype detection …
ExcaliburCon
In this video, recorded at BruCON, security professional and book author Jayson Street discusses the upcoming ExcaliburCon conference taking place in Wuxi, China. The …
A checklist for guarding against cache poisoning attacks
When reviewing your network infrastructure, don’t forget about that most arcane of networking technologies, the Domain Name System. A compromise of your name servers …
A closer look at GFI Backup 2009 – Home Edition 3.0
GFI Backup 2009 – Home Edition is a free backup software solution that allows you to backup all your documents, photos, music, e-mails and program settings using a …
Q&A: Worldwide surveillance and filtering
The aim of the OpenNet Initiative is to investigate, expose and analyze Internet filtering and surveillance practices in a credible and non-partisan fashion. Rafal Rohozinski …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd