Please turn on your JavaScript for this page to function normally.
Wireless Security Starts at the Endpoint

Offering convenience and ease of use that have revolutionized the way people use computers and networks, wireless networks have also complicated endpoint management and …

Who Can You Trust?

Companies have traditionally adopted a fortress mentality with network perimeter security to protect corporate applications and assets. But things are changing, driven by …

Bugger The Debugger – Pre Interaction Debugger Code Execution

The use of debuggers to analyse malicious or otherwise unknown binaries has become a requirement for reverse engineering executables to help determine their purpose. While …

The Shifting Tactics of Spammers: Protect Your Firm Against the Newest Email Threats

The battleground in the ongoing fight against spam by organizations worldwide is shifting based on new tactics from spammers and hackers designed to defeat conventional …

The Invisible Threat From Mobile Devices

By now I’m sure we are all aware of the potential risks of wireless networks, and the threat to both corporate and home users from hackers, crackers, worms, viruses, …

Stolen Voices – The Challenge of Securing VoIP

Voice over IP (VoIP) is rapidly becoming a pervasive technology as businesses embrace cost savings on calls whilst enjoying advanced communications applications sitting within …

Malware Comes Of Age: The Arrival Of The True Computer Parasite

Even though malware has been a recognised threat within the general IT community for well over 15 years, it is effectively a bigger problem now than it has ever been before. …

Why Due Diligence as a Defense is Not Enough

Corporate executives love two words, “Due Diligence”. Unfortunately, this is only half of the required formula for meeting the requirements under “Standard …

Freedom From Security

Enterprises are no longer restricted to the networked systems bounded by the building in which the company is housed. Modern enterprises span the globe and employees can …

Writing an Incident Handling and Recovery Plan

Introduction While many websites and papers discuss incident handling and incident response plans, aside from RFC 2350 very few of these lay out exactly what an actual plan …

Combating “Cardholder Not Present” Fraud

Of the security issues facing banks everywhere, prevention of card fraud has always been a high priority, and is set to grow even further in importance. The level of card …

The Rise Of The Customised Security Attack

The email security landscape is constantly changing, and one of the biggest shifts during the past twelve months has been the dominance of convergence – the practice of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools