Expert analysis
Guide to Online Antivirus Solutions Part 4: Norman SandBox Malware Analyzer
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Malware Evolution: April – June 2007
The events that took place during the first six months of 2007 have shown us that the direction in which threats are evolving is from social engineering to the increased usage …
Working with the iStumbler Wireless Discovery Tool
iStumbler is the leading wireless discovery tool for Mac OS X. It provides plugins for finding AirPort networks, Bluetooth devices and Bonjour services. The application is …
Interview with Christen Krogh, Opera Software’s VP of Engineering
Christen Krogh is responsible for all software development at Opera. Krogh received his bachelor’s degree in computer science from Glasgow University and his Ph.D from …
Guide to Online Antivirus Solutions Part 3: Kaspersky Online Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Compliance, IT Security and a Clear Conscience
Never has the need to prove compliance with external regulations and internal policies been more acute than it is today. The likely consequences of failing to prove that your …
Step-by-step Guide to Online Amazon S3 Backups with Jungle Disk
Jungle Disk is an application that lets you store files and backup data securely to Amazon.com’s S3 Storage Service. Amazon S3 provides a simple web services interface …
PDF Spam: A Step Ahead of Image Spam
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the …
Guide to Online Antivirus Solutions Part 2: Trend Micro HouseCall
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Quantitative Look at Penetration Testing
Since 2004 Matta has been running a project to test the technical competence of security consultants. With probably the largest collection of data on the methodology’s …
Manage Your Passwords with 1Passwd
Nowadays everyone has too many passwords to remember. People either use easy to remember passwords or even worse, the same password for multiple accounts. 1Passwd makes things …
The Story of DEFCON
Jeff Moss aka Dark Tangent, the founder of DEFCON and Black Hat, tells the history of the largest hacker conference and how it all got started. Find out more about the early …