Expert analysis
Domain Footprinting for Web Applications and Web Services
A wide array of services, from banking and finance transactions to auctions and ticket reservations, are being offered to customers online. This means that an Internet …
Web Application Defense At The Gates – Leveraging IHttpModule
Web applications are vulnerable to many attacks, mainly due to poor input validation at the source code level. Firewalls can block access to ports but once a web application …
Securing Optical Networks With Quantum Cryptography
In a world where the reliance on electronic data transmission and processing is becoming every day more prevalent, it is of critical importance for organizations to guarantee …
Qualys CTO on SANS Top 20 Quaterly Update
More than 600 new Internet security vulnerabilities were discovered during the first quarter of 2005, according to the SANS Institute and a team of experts from industry and …
Infosecurity Europe 2005 – First Issue of (IN)SECURE Magazine Available for Download
During the second day of Infosecurity Europe 2005 Conference, HNS announced the first issue of (IN)SECURE Magazine, a freely available, freely distributable digital security …
Infosecurity Europe 2005 Showcase Video
Here’s a showcase of the Infosecurity Europe 2005 conference in London. The video is 2:58 minutes in length, available for download in Windows Media 9 256K (5.5 MB) and …
Infosecurity Europe 2005 – ZyXEL Launches the First Stand-alone Single User Firewall
The ZyWALL P1 is the first portable, single-user personal firewall device designed to enable remote workers to connect to any corporate VPN securely, without the need for VPN …
Wireless Security Starts at the Endpoint
Offering convenience and ease of use that have revolutionized the way people use computers and networks, wireless networks have also complicated endpoint management and …
Who Can You Trust?
Companies have traditionally adopted a fortress mentality with network perimeter security to protect corporate applications and assets. But things are changing, driven by …
Bugger The Debugger – Pre Interaction Debugger Code Execution
The use of debuggers to analyse malicious or otherwise unknown binaries has become a requirement for reverse engineering executables to help determine their purpose. While …
The Shifting Tactics of Spammers: Protect Your Firm Against the Newest Email Threats
The battleground in the ongoing fight against spam by organizations worldwide is shifting based on new tactics from spammers and hackers designed to defeat conventional …
The Invisible Threat From Mobile Devices
By now I’m sure we are all aware of the potential risks of wireless networks, and the threat to both corporate and home users from hackers, crackers, worms, viruses, …