Expert analysis
WiFi Epidemiology: Can Your Neighbors’ Router Make Yours Sick?
In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch …
Dissecting and Digging Application Source Code for Vulnerabilities
Application source code scanning for vulnerability detection is an interesting challenge and relatively complex problem as well. There are several security issues which are …
Key Management for Enterprise Data Encryption
Data encryption and key management in the real world Best practices dictate that we must protect sensitive data at the point of capture, as it’s transferred over the …
phpBB hacks: password security, anti robot login and a full board security system
phpBB uses its own authorisation/session handling, database abstraction layer and template systems, so there are numerous guides on how to use them to create your own …
Security Predictions for 2008
Saumil Shah is the founder and CEO of Net-Square. In this video, made at Black Hat, he presents an overview on what we can expect in 2008. Saumil bases his assessment on seven …
Security Extensions for Your Joomla! Installation
Joomla! is a free, open source Content Management System that allows you to build websites and other online applications. Because it’s easy to install and simple to …
On the Security of E-Passports
The global introduction of electronic passports is a large coordinated attempt to increase passport security. Issuing countries can use the technology to combat passport …
WordPress Security Plugins
WordPress is a powerful publishing platform that is easy to use and offers anyone the possibility to start a blog in no time. Because of its versatility and a large quantity …
The Case for Automated Log Management in Meeting HIPAA Compliance
The Impact of HIPAA The Health Insurance Portability Accountability Act, better known as HIPAA, was passed in 1996 by the US Department of Health and Human Standards (HHS) to …
Privacy: Erase Your Hard Drive
You may not be aware of this, but merely erasing your data the regular way does not make it disappear for good. Some of it can still be retrieved with the use of recovery …
Network Access Control (NAC)
The three cardinal questions for security compliance, which every network administrator and owner endeavour to answer are: How do I stop unauthorized users and endpoints from …
Security Plugins for Movable Type
Movable Type is a popular weblog publishing system that supports a variety of plugins. This article lists some very useful security-oriented plugins that can enhance your …
Featured news
Resources
Don't miss
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024