Expert analysis
Interview with Edward Gibson, Chief Security Advisor at Microsoft UK
Mr. Gibson is the Chief Security Advisor for Microsoft in the UK. This role comes on the heels of his retirement from a 20-year career as a Supervisory Special Agent with the …
Online Games and Fraud: Using Games as Bait
We all play games. Some play sports, some gamble, and for some people, life itself is a game. Even computer games have become an everyday phenomenon, with millions of people …
A Closer Look at the CCNP Video Mentor
We were provided with a copy of the new Cisco Press multimedia publication “CCNP Video Mentor“. As you probably know, Cisco Press on a regular basis releases a …
Guide to Online Antivirus Solutions Part 6: ESET Online Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Practical 10 Minutes Security Audit: Oracle Case
This paper will show an extremely simple technique to quickly audit a software product in order to infer how trustworthy and secure it is. It will show you step by step how to …
Log Management in PCI Compliance
Security professionals have come to realize that ensuring data security and integrity is critical to business continuity and risk mitigation. However, with increasing amounts …
Reducing Shoulder-surfing by Using Gaze-based Password Entry
Shoulder-surfing – using direct observation techniques, such as looking over someone’s shoulder, to get passwords, PINs and other sensitive personal information …
Security Economics
Information security has finally become mainstream. It is almost a recognized profession, with its own areas of specialization: network security, audit, incident response, …
5 Security Widgets for the Opera Browser
Widgets are Web programs you can run right on your desktop using Opera 9. This article introduces security-related widgets that will enhance your Opera experience. …
Designing a PCI-Compliant Log Monitoring System
Log monitoring activities are an integral part of Requirement 10 of the PCI Data Security Standard and it can be difficult to understand how the different logging portions of …
Guide to Online Antivirus Solutions Part 5: BitDefender Online Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Super Ninja Privacy Techniques for Web App Developers
If I keep my documents on Google Docs, my mail on Yahoo Mail, my bookmarks on del.icio.us, and my address book on .Mac, is there any point in talking about the privacy of my …
Featured news
Resources
Don't miss
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol