Please turn on your JavaScript for this page to function normally.
Spoofing – Arts of attack and defense

How to spot and avoid potential spoof atacks. Covers DNS spoofing, IP address spoofing, email address spoofing, link alteration, name similarity and content theft. Download …

Explaining Encryption

Make any enquiry about computer security, and you will almost immediately fall over the terms cryptography and encryption (and also decryption), but what exactly is meant by …

How do you deal with Internet fraud?

This paper covers fraud that uses Internet technology as an integral part of the fraud and fraud that is already taking place by other means where the Internet is merely …

Bind Security Vulnerabilities Roundup

1) Original advisory on this topic 2) Vendor response (Internet Software Consortium) 3) Security advisories by Linux vendors 4) Additional information Original advisory on …

The changing face of web security

Are we winning or losing the battle of web security? Read this white paper backed by industry figures to ensure you are aware of the facts. Download the paper in PDF format here.

What makes a good Password?

The first thing to understand, is what makes a bad password. The worst passwords are: password, 111111, fred, master, boss and whatever is the name of your …

An introduction to PKI

This guide provides the reader with a basic introduction to key terms and concepts used in a PKI including Certificates, Keys and Authorities. It mentions the features and …

Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection

Wireless LAN discovery through the use of applications such as NetStumbler, DStumbler, Wellenreiter and others is an increasingly popular technique for network penetration. …

Timing the Application of Security Patches for Optimal Uptime

Security vulnerabilities are discovered, become publicly known, get exploited by attackers, and patches come out. When should one apply security patches? Patch too soon, and …

Host Discovery with nmap

As a Computer Security Engineer that regularly conducts external penetration tests, a recurring challenge seems to arise when assessing organizations with a large allocation …

Vulnerabilities in Microsoft’s Java implementation

Overview Microsoft Internet Explorer comes with Java virtual machine and accompanying class packages. Multiple security vulnerabilities have been found in the Java …

New NetScreen-5XT features increase security for remote sites

NetScreen Technologies, Inc. has announced new features for the NetScreen-5XT that will increase the level of security provided for companies looking needing a secure way of …

Don't miss

Cybersecurity news