Please turn on your JavaScript for this page to function normally.
New Automated 802.11 Wireless Security Software From Code Red Systems

A limited free download of the AirBlock 802.11 wireless security software for residential and small business networks has been made available by Code Red Systems, a provider …

Interview with Mohammed J. Kabir, author of the “Red Hat Linux Survival Guide”

Mohammed J. Kabir (prefers to be called Kabir) is the founder and CEO of EVOKNOW, Inc. His company, EVOKNOW, develops email and GIS software. Kabir also leads a consulting …

OpenSSH Buffer Management Vulnerability

Early today we received a note that there are rumblings in the underground related to a new OpenSSH vulnerability. The official web site says that a new version of OpenSSH was …

Wireless Security: Preventing Your Data From Vanishing Into Thin Air

Despite its many exciting possibilities for new business opportunities, cost-savings, and user freedom, wireless technology presents serious challenges to information …

An Integrated Approach to Threat Management

Effective Threat Management embodies the actions organizations must take to defend themselves against today’s ever-present cyber-threats. At a high-level, these actions …

A Walk Through “Sombria”: A Network Surveillance System

Sombria (“shadowy” in Portuguese) is a honeypot system set up in Tokyo, Japan, that is intended for network surveillance and research and not for production …

Interview with John Vacca, information technology consultant and internationally known author

John Vacca is an information technology consultant and internationally known author based in Pomeroy, Ohio. Since 1982, John has authored of 30 books and more than 390 …

Information Security Checklist

Today’s heightened awareness of the need to secure IT infrastructures and protect mission critical data is leading more and more organizations to reevaluate their …

Protecting Databases

One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason …

Prison for computer crime

The Justice Ministers of the 15 Member States of the European Union have decided to modify their country laws, with the aim of including prison sentences for the authors of …

Blindfolded SQL Injection

Until today, exploiting SQL Injection attacks depended on having the Web Server return detailed error messages or having any other source of information. As a result, many …

SCO vs. IBM

SCO’s lawsuit against IBM and SCO’s demanding money from companies using Linux has caused some using Linux to worry that this wonderful “too good to be …

Don't miss

Cybersecurity news