Please turn on your JavaScript for this page to function normally.
The 2005 SANS Top 20 Internet Security Vulnerabilities

Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security …

OATH Announces 2006 Roadmap for Open Authentication

OATH, the Initiative for Open Authentication, today announced the organization’s 2006 technology roadmap that builds upon the technical framework for open authentication …

How To Lock Down Enterprise Data With Infrastructure Services

How do you protect privacy at the level of individual records in applications, databases, and file systems? As data resources become networked in more complex three tier …

Interview with Alf Watt, Creator of iStumbler

Introduce yourself to our readers. Before writing iStumbler I worked at various startups during the dot-com bubble in San Francisco. After the ‘big pop’ of 2001 I …

Microsoft Patch Tuesday Brings Only One Patch

November’s update is much different than last month’s update since Microsoft released only one patch today. This month’s Security Bulletin affects Microsoft …

The Story of PGP: Past, Present and Future

Recently we met with Jon Callas, CTO and CSO of PGP Corporation. Pretty Good Privacy (PGP) is today’s most used crypto software with a lot of history. Presented here is …

Lavasoft Personal Firewall Offers Enhanced Protection

Lavasoft, the world leading anti-spyware vendor has established a partnership with Agnitum, the leader in security and privacy software for home and office PCs. Lavasoft will …

Web Applications Worms – The Next Internet Infestation

While organizations rush to develop their security policies and implement even a basic security foundation, the professional hacker continues to find new ways to attack. Their …

Anti-Virus Information Exchange Network Statement on Spyware

Over the past several years, software termed SpyWare has invaded personal computers world-wide and caused increasing problems for users and organizations alike. Members of …

The Importance of Web Application Scanning

Organizations need a Web application scanning solution that can scan for security loopholes in Web-based applications to prevent would-be hackers from gaining unauthorized …

Discover Potential Security Risks in Nearby Bluetooth Devices

AirMagnet, Inc. introduced its BlueSweep software, designed to identify nearby devices with Bluetooth wireless technology and alert users to potential Bluetooth security …

HNS 7th Anniversary Book Contest

Today HNS celebrates it’s 7th year of online presence. We would like to thank all the visitors and contributors that helped us become what we are today. To celebrate …

Don't miss

Cybersecurity news