Expert analysis
The Fedora – Red Hat False Vulnerability Scam
It looks like the “evil minds” have found a new way to use spam for their devious plans. This time spam is combined with a scam that will try to use social …
Understanding E-mail Spoofing
If you receive a snail mail letter, you look to the return address in the top left corner as an indicator of where it originated. However, the sender could write any name and …
Tips on Securing Instant Messaging
According to one of the latest research studies, 92% of all commerical and non-commerical organizations are using instant messaging in the enterprise. Tom Buoniello, VP of …
Security Designs of SSL VPNs
During the Infosecurity Europe 2004 show, we caught up with William Orme, Senior Technical Consultant at Whale Communications, and talked to him about SSL VPNs. In this audio …
Viruses In Handheld Devices
The advertising of computer systems is increasingly centered on handheld devices or personal digital assistants (PDAs). Prices of these devices have gone down considerably …
So Many Worms, So Little Time
Introduction Let’s face it; the Internet is a dangerous place, and it’s not getting any better. Statistics show a rapid increase in the rate of Internet-based …
Baselining with Security Templates
The solution to creating and implementing security baselines on computers in your network is to “just do it.” Security baselines establish the foundation for the …
How To Combat Spyware
The increasing -often commercial- interest in obtaining data that can identify and profile users is the root of the growing concern among the Internet community regarding …
The Certification of SSL VPNs
During the Infosecurity Europe 2004, we caught up with Brian Monkman, Technology Programs Manager at ICSA Labs, and talked to him about SSL VPNs. In this audio session, Mr. …
Video Interview with Chris Potter, PricewaterhouseCoopers Information Security Assurance Partner
In this video Mr. Potter talks about what can be done in order to minimize the recovery time from an incident, discusses the threat posed by increased mobile computing, the …
Who Goes to Jail?
The CIO has been living with the apparently unstoppable demand for more storage for quite a while, really since the Internet/ World Wide Web introduced a whole new concept of …
To Catch A Virus
Alfred Hitchcock, that great magician of the big screen, often said that to maintain suspense, the audience needed to know more about the situation than the characters in the …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?