Please turn on your JavaScript for this page to function normally.
Guide to Online Antivirus Solutions Part 4: Norman SandBox Malware Analyzer

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Malware Evolution: April – June 2007

The events that took place during the first six months of 2007 have shown us that the direction in which threats are evolving is from social engineering to the increased usage …

Working with the iStumbler Wireless Discovery Tool

iStumbler is the leading wireless discovery tool for Mac OS X. It provides plugins for finding AirPort networks, Bluetooth devices and Bonjour services. The application is …

Interview with Christen Krogh, Opera Software’s VP of Engineering

Christen Krogh is responsible for all software development at Opera. Krogh received his bachelor’s degree in computer science from Glasgow University and his Ph.D from …

Guide to Online Antivirus Solutions Part 3: Kaspersky Online Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Compliance, IT Security and a Clear Conscience

Never has the need to prove compliance with external regulations and internal policies been more acute than it is today. The likely consequences of failing to prove that your …

Step-by-step Guide to Online Amazon S3 Backups with Jungle Disk

Jungle Disk is an application that lets you store files and backup data securely to Amazon.com’s S3 Storage Service. Amazon S3 provides a simple web services interface …

PDF Spam: A Step Ahead of Image Spam

This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the …

Guide to Online Antivirus Solutions Part 2: Trend Micro HouseCall

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Quantitative Look at Penetration Testing

Since 2004 Matta has been running a project to test the technical competence of security consultants. With probably the largest collection of data on the methodology’s …

Manage Your Passwords with 1Passwd

Nowadays everyone has too many passwords to remember. People either use easy to remember passwords or even worse, the same password for multiple accounts. 1Passwd makes things …

The Story of DEFCON

Jeff Moss aka Dark Tangent, the founder of DEFCON and Black Hat, tells the history of the largest hacker conference and how it all got started. Find out more about the early …

Don't miss

Cybersecurity news