Expert analysis
A closer look at IObit Security 360 1.0
IObit Security 360 is a malware and spyware removal tool that detects, removes the deepest infections, and protects your PC from spyware, adware, trojans, keyloggers, bots, …
Q&A: Splunk
In this interview the Splunk team discusses Splunk in detail. What is Splunk? Splunk was born from its founders’ frustration in running some of the worlds largest IT …
BruCON: Hackers descend on Belgium
After visiting several computer security events and being impressed by the energy and the open exchange of knowledge, a small group of people dreamed of creating a hacker …
Dissecting the hack: the f0rb1dd3n network
In this video, recorded last week at BruCON, Jayson Street talks about his book – “Dissecting the hack: the f0rb1dd3n network” – published by Syngress. …
Q&A: Information assurance
Ravinderpal “Ravi” Sandhu is The University of Texas at San Antonio (UTSA)’s Lutcher Brown distinguished chair in cyber security and the executive director …
A closer look at Trend Micro HijackThis 2.0.2
HijackThis is a tiny program helps you get rid of persistent spyware by examining vulnerable or suspect parts of your system, such as browser helper objects and certain types …
Firewall management today and tomorrow
What features are real game changers when it comes to firewall management, and how far along is the market in the development cycle? A brief history of firewall management …
Q&A: 1Password
Carl Slawinski is the Chief Evangelist for Agile Web Solutions, the company behind 1Password, a hugely popular Mac software title. In this interview he takes us down memory …
European information security leaders gather in Greece
After a successful event in 2008, beautiful Aldemar Knossos Royale Village resort on the island of Crete is once again hosting a group of experts in Information security, …
Cross Widget DOM access: Spy on the page
Widgets, Gadgets or Modules are very common and powerful feature of Web 2.0 applications. They convert a single loaded page in the browser to multi-threaded application. They …
Web applications: Easy prey for hackers
Web applications are usually exposed on the Internet and offer an easier prey for attackers, who can develop tools that mimic legitimate users behavior in order to scan the …
Q&A: SQL injection
Justin Clarke is a co-founder and Director at Gotham Digital Science. He has over twelve years of experience in assessing the security of networks, web applications, and …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity