Please turn on your JavaScript for this page to function normally.
Improvements to Microsoft Security Reponse Communications

Steve Lipner, Director of Security Assurance at Microsoft, posted a message to the Security Notification mailing list about some new changes in the communications practices …

Trustix Secure Linux 2.0 Technology Preview 1 Released

Trustix team announced that Trustix Secure Linux 2.0 Technology Preview 1 (aka Rainstorm) is available for download. As this is a technology preview, it is not intended for …

AirDefense Wireless LAN Security to Deflect and Trap Intruders

AirDefense Inc. has introduced a new element to wireless LAN security with the launch of its ActiveDefense, a security appliance that shields 802.11 wireless LANs from …

Security holes… Who cares?

We report on an observational study of user response following the OpenSSL remote buffer overflows of July 2002 and the worm that exploited it in September 2002. Immediately …

Spoofing – Arts of attack and defense

How to spot and avoid potential spoof atacks. Covers DNS spoofing, IP address spoofing, email address spoofing, link alteration, name similarity and content theft. Download …

Explaining Encryption

Make any enquiry about computer security, and you will almost immediately fall over the terms cryptography and encryption (and also decryption), but what exactly is meant by …

How do you deal with Internet fraud?

This paper covers fraud that uses Internet technology as an integral part of the fraud and fraud that is already taking place by other means where the Internet is merely …

Bind Security Vulnerabilities Roundup

1) Original advisory on this topic 2) Vendor response (Internet Software Consortium) 3) Security advisories by Linux vendors 4) Additional information Original advisory on …

The changing face of web security

Are we winning or losing the battle of web security? Read this white paper backed by industry figures to ensure you are aware of the facts. Download the paper in PDF format here.

What makes a good Password?

The first thing to understand, is what makes a bad password. The worst passwords are: password, 111111, fred, master, boss and whatever is the name of your …

An introduction to PKI

This guide provides the reader with a basic introduction to key terms and concepts used in a PKI including Certificates, Keys and Authorities. It mentions the features and …

Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection

Wireless LAN discovery through the use of applications such as NetStumbler, DStumbler, Wellenreiter and others is an increasingly popular technique for network penetration. …

Don't miss

Cybersecurity news