Expert analysis
Web Applications Worms – The Next Internet Infestation
While organizations rush to develop their security policies and implement even a basic security foundation, the professional hacker continues to find new ways to attack. Their …
Anti-Virus Information Exchange Network Statement on Spyware
Over the past several years, software termed SpyWare has invaded personal computers world-wide and caused increasing problems for users and organizations alike. Members of …
The Importance of Web Application Scanning
Organizations need a Web application scanning solution that can scan for security loopholes in Web-based applications to prevent would-be hackers from gaining unauthorized …
Discover Potential Security Risks in Nearby Bluetooth Devices
AirMagnet, Inc. introduced its BlueSweep software, designed to identify nearby devices with Bluetooth wireless technology and alert users to potential Bluetooth security …
HNS 7th Anniversary Book Contest
Today HNS celebrates it’s 7th year of online presence. We would like to thank all the visitors and contributors that helped us become what we are today. To celebrate …
Crypto Improvements in Internet Explorer 7 Beta 2
The Microsoft Internet Explorer Weblog reported new improvements related to security and user experience for HTTPS connections. It is said that for Internet Explorer 7, the …
Skype Buffer Overflow Vulnerability
Security portion of Skype’s web site mentions a vulnerability in Skype-specific URI and VCARD import handling. The report says that this problem is a subsidiary effect …
12 Months of Progress for the Microsoft Security Response Centre
As the Internet has grown in popularity so too have threats against computer users; making it critical for individuals and companies to employ effective security strategies to …
The Story of Snort: Past, Present and Future
Last week we met with Martin Roesch, the creator of Snort, the de facto standard for intrusion detection/prevention. Presented here is the entire story of Snort in his words …
VoIP Security Alliance Delivers VoIP Security Framework
The Voice over IP Security Alliance (VOIPSA), today released the first comprehensive description of security and threats in the field of VoIP. The results, known as the VoIP …
ISO 27001 Security Standard Published
After several months in final draft mode, ISO 27001 has been published as an official standard. It essentially defines an Information Security Management System and …
RSA Conference Europe 2005 Showcase Video
Here’s a showcase of the RSA Conference Europe 2005 in Vienna. The video is 2:00 minutes in length, available in Windows Media 9 256K (3.7 MB) and 64K (936 KB). Click on …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act