Expert analysis
Q&A: E-mail Security Threats and Countermeasures
David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …
Politically motivated Distributed Denial of Service attacks
In the new edition of the HNS podcast Dr. Jose Nazario, Arbor Networks senior security researcher, talks about politically motivated DDoS attacks around the world.
Blind SQL Injection Discovery And Exploitation Technique
This paper describes a technique to deal with blind SQL injection spot with ASP/ASP.NET applications running with access to XP_CMDSHELL. It is possible to perform a pen test …
Web application security landscape and trends
In the latest issue of the HNS Podcast, Mandeep Khera from Cenzic shares web application security trends observed by his company in the first quarter of 2008. Mr. Khera also …
The Botnet Business
Botnets have been in existence for about 10 years; experts have been warning the public about the threat posed by botnets for more or less the same period. Nevertheless, the …
Safeguarding Your Data With TrueCrypt
There are countless reasons why you’d like to make sure your data stays private. Maybe you travel a lot and you’re worried your laptop may be stolen, perhaps you …
Showcase: Portable Security
At the RSA Conference 2008 in San Francisco we caught up with MXI Security. In this video you can see a showcase of their offerings related to portable security.
Information Assurance: National Security’s New Front Line
Nowadays, few would ever consider using the Internet “unprotected” without a reliable anti-virus software and firewall solution installed on their PC networks. Yet …
The Rising Trend of Internet Counter-Intelligence
All types of organizations – from Fortune 500 to “mom-and-pop” operations – have mandated the use of anti-virus, anti-adware, anti-spam, firewall and …
How To Protect Your Laptop From Prying Eyes With a Privacy Filter
While attending the RSA Conference show last month in San Francisco, we met a lot of people and talked with a number of companies. We brought home a large list of gadgets, …
The Enigma Machine
The National Security Agency (NSA) had an Enigma machine in their booth at the RSA Conference 2008 in San Francisco. Here’s a video that shows the machine and provides …
HNS Podcast: Jeremiah Grossman’s top security conferences
Jeremiah Grossman, the founder and Chief Technology Officer of WhiteHat Security attends quite a number of security conferences around the globe. A couple of weeks ago we had …
Featured news
Resources
Don't miss
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024