Expert analysis
The 2005 SANS Top 20 Internet Security Vulnerabilities
Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security …
OATH Announces 2006 Roadmap for Open Authentication
OATH, the Initiative for Open Authentication, today announced the organization’s 2006 technology roadmap that builds upon the technical framework for open authentication …
How To Lock Down Enterprise Data With Infrastructure Services
How do you protect privacy at the level of individual records in applications, databases, and file systems? As data resources become networked in more complex three tier …
Interview with Alf Watt, Creator of iStumbler
Introduce yourself to our readers. Before writing iStumbler I worked at various startups during the dot-com bubble in San Francisco. After the ‘big pop’ of 2001 I …
Microsoft Patch Tuesday Brings Only One Patch
November’s update is much different than last month’s update since Microsoft released only one patch today. This month’s Security Bulletin affects Microsoft …
The Story of PGP: Past, Present and Future
Recently we met with Jon Callas, CTO and CSO of PGP Corporation. Pretty Good Privacy (PGP) is today’s most used crypto software with a lot of history. Presented here is …
Lavasoft Personal Firewall Offers Enhanced Protection
Lavasoft, the world leading anti-spyware vendor has established a partnership with Agnitum, the leader in security and privacy software for home and office PCs. Lavasoft will …
Web Applications Worms – The Next Internet Infestation
While organizations rush to develop their security policies and implement even a basic security foundation, the professional hacker continues to find new ways to attack. Their …
Anti-Virus Information Exchange Network Statement on Spyware
Over the past several years, software termed SpyWare has invaded personal computers world-wide and caused increasing problems for users and organizations alike. Members of …
The Importance of Web Application Scanning
Organizations need a Web application scanning solution that can scan for security loopholes in Web-based applications to prevent would-be hackers from gaining unauthorized …
Discover Potential Security Risks in Nearby Bluetooth Devices
AirMagnet, Inc. introduced its BlueSweep software, designed to identify nearby devices with Bluetooth wireless technology and alert users to potential Bluetooth security …
HNS 7th Anniversary Book Contest
Today HNS celebrates it’s 7th year of online presence. We would like to thank all the visitors and contributors that helped us become what we are today. To celebrate …