Expert analysis
“Sombria:” A Witness to Potential Cyber Crimes
The second report of Sombria provides a more succinct and focused overview of the main events “witnessed” by the honeypot system during the months of August, …
Packet Sniffing on Layer 2 Switched Local Area Networks
Packet sniffing is a technique of monitoring network traffic. It is effective on both switched and nonswitched networks. In a non-switched network environment packet sniffing …
Hackproofing DB2
The main points of this presentation are: The state of DB2 security Secure configuration of DB2 Securing DB2 in a Web application Database vulnerabilities Download the …
Overview of Virus Bulletin December 2003 Issue
The December issue of Virus Bulletin magazine starts with an editorial written by the magazine’s new Technical Editor Morton Swimmer. In his first commentary piece, Mr. …
Remote Hot Spot – The Market For SSL VPNs Catches Fire
Welcome to the world of Secure Sockets Layer (SSL) Virtual Private Networks (VPNS), the hottest of hotspots in town, fuelled by the surge towards more remote working for …
Interview with Michael J. Weber, author of “Invasion of Privacy”
Michael J. Weber’s career began on Madison Avenue where he produced hundreds of TV commercials, including several award winners, for top sponsors and ad agencies. He …
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
Network intrusion detection systems have become one of several invaluable tools to safeguard critical infrastructure and information. Publicly available network intrusion …
Circumventing Validation
Web developers spend a lot of time planning out complex chains of events to make thier web applications work. Within the planning and outlines, implicit control over the chain …
Real World XSS
This paper covers most aspects of XSS attacks including: injection points attack scenarios attacker motivations and techniques code obfuscation examples starts laying a …
Current Antivirus Software is Not Enough
The purpose of antivirus protection on a computer is to prevent the entrance of viruses. There is certainly good reason for using such software, as there are a great number of …
The Top 10 Internet Security Screw Ups
With over 10 years experience of defending against Internet Security threats, Tom Salkield, Managing Director of NetConnect, has seen it all. NetConnect, part of Netstore plc, …
Why Bother Virus Scanning?
I have always thought the idea of scanning for viruses to be flawed, well certainly as a security measure. Yet nearly all of you reading this article will be relying on just …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?