Expert analysis
A closer look at Trend Micro HijackThis 2.0.2
HijackThis is a tiny program helps you get rid of persistent spyware by examining vulnerable or suspect parts of your system, such as browser helper objects and certain types …
Firewall management today and tomorrow
What features are real game changers when it comes to firewall management, and how far along is the market in the development cycle? A brief history of firewall management …
Q&A: 1Password
Carl Slawinski is the Chief Evangelist for Agile Web Solutions, the company behind 1Password, a hugely popular Mac software title. In this interview he takes us down memory …
European information security leaders gather in Greece
After a successful event in 2008, beautiful Aldemar Knossos Royale Village resort on the island of Crete is once again hosting a group of experts in Information security, …
Cross Widget DOM access: Spy on the page
Widgets, Gadgets or Modules are very common and powerful feature of Web 2.0 applications. They convert a single loaded page in the browser to multi-threaded application. They …
Web applications: Easy prey for hackers
Web applications are usually exposed on the Internet and offer an easier prey for attackers, who can develop tools that mimic legitimate users behavior in order to scan the …
Q&A: SQL injection
Justin Clarke is a co-founder and Director at Gotham Digital Science. He has over twelve years of experience in assessing the security of networks, web applications, and …
Vast malware repository dedicated to testing and research
Frame4 Group is a Dutch company that has made its name specializing in different fields within IT: project and change management, process engineering, test coordination and …
The path to comprehensive ID management
There have been many changes since enterprises first looked at implementing smart card-based common access card programs in the 1990s. Although some large corporations …
Q&A: Enterprise threats and compliance
John Viega is the CTO, Software-as-a-Service, at McAfee. John is author of many security books and is responsible for numerous software security tools and is the original …
A closer look at F-Secure Internet Security 2010
Following a redesign of their logo and their motto, F-Secure redesigned their Internet Security suite. F-Secure Internet Security 2010 is a security solution designed for …
7 tips for basic e-mail security
Simple to implement, these tips can be a good start to making sure your e-mail communication becomes more secure. 1. Understand that no e-mail communication is 100% secure. We …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work