Expert analysis
Tips For Staying Secure in 2006
So 2005 has gone down as the worst year for data security breaches. I suppose the good news is that we seemed to be less troubled by viruses, so either the virus developers …
Malware – Future Trends
Malware has truly evolved during the last couple of years. Its potential for financial and network based abuse was quickly realized, and thus, tactics changed, consolidation …
Interview with Dr. Horst Joepen, Senior Vice President Strategic Alliances CyberGuard
In your opinion, what is the single biggest security threat on the Internet today? This is exactly the problem: there is no single biggest threat, but a huge and ever growing …
Florida Spammer Receives 6.5 Billion Pounds Fine
According to media reports, an US-based ISP has been awarded the amount of 6.5 billion pounds in a judgement against a Florida man who sent millions of unsolicited spam …
Why Asset-Based Security Makes Sense
On November 22, 2005, the SANS Institute released its annual report of the top 20 vulnerabilities of the year. As has been noted elsewhere in the security industry, the 2005 …
Denial of service in the BlackBerry browser
A vulnerability has been detected in the browser in BlackBerry devices, which could allow remote attackers to cause denial of service conditions. BlackBerry has released the …
People Power Combats Cyber Fraud
Like so many other aspects of our lives, major fraud has gone high tech. In fact, fuelled by excited media comment, computer crime and fraud are regarded as synonymous by …
IT threats in 2006
The year that is just coming to an end has marked a turning point with respect to Internet threats. The last 12 months have been notable for the absence of the kind of massive …
Junking The Junk: Staying Ahead Of Spam Attacks
The numbers speak for themselves: in 2005, junk mail accounted for nearly 60 percent of all emails, up from just 10 per cent in 2001. And this growth looks set to continue. …
Looking Back At Computer Security In 2005
What follows are some of the biggest events of 2005 with comments by (in no particular order): Bruce Schneier – CTO of Counterpane Internet Security and acclaimed …
Social Engineering And Other Threats To Internal Security
Consider the following scenario. A good looking woman is wandering around your premises and approaches you asking to show her how to use some functions in Excel or any other …
Declaration of Rights for Administrators and End Users
One network administrator, Susan Bradley, proposed a “Declaration of Rights for Administrators and End Users,” published recently on Patch Management.org. …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act