Please turn on your JavaScript for this page to function normally.
Network Associates Fights Spam

The McAfee Security division of Network Associates, Inc. announced a new initiative to combat spam through increased education, awareness, and technology, expanding upon the …

The IP Smart Spoofing

This paper describes a new technique for spoofing an IP address with any networking application. IP spoofing is not new and various hacking tools have been developed to …

Check Point VPN-1/FireWall-1 added to Computer History Museum

Check Point VPN-1/FireWall-1 was presented to the Computer History Museum during a recent visit to the museum by Check Point’s executives. Established in 1996, the …

No more security patches for SuSE Linux 7.0

SuSE announced today on their suse-security-announce mailing list, that with the release of SuSE Linux 8.1 i386 (ftp available version), SuSE Linux 7.0 will be discontinued. …

DallasCon Wireless Security Conference for your wireless needs

Wireless security is one of the most interesting topics in the Information Security lately. More and more companies rely on wireless technology, which automatically means that …

McAfee anti virus included on MSN 8 cd-rom

McAfee Security Consumer, a division of Network Associates, announced a partnership with MSN. According to the terms, McAfee VirusScan Online is added to the MSN 8 cd-rom, …

Countering cyber war

For many, the term cyber war conjures up images of deadly, malicious programmes causing computer systems to freeze, weapon systems to fail, thwarting vaunted technological …

Dealing with External Computer Security Incidents

Dealing with computer security incidents is extremely difficult. There are many ways that incidents can occur and many types of impact they can have on an organization. There …

RSA Security collaborates with AMD to boost security

RSA Security Inc. announced they are collaborating with Advanced Micro Devices to deliver optimized encryption software for current AMD Athlon processors and upcoming AMD …

Check Point expands Security Management Architecture product line

Check Point Software Technologies, one of the key players in the VPN and firewall markets, announced two add-ons to their SMART (Security Management Architecture) product line …

Open Source Digital Forensics Tools: The Legal Argument

This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and …

Can you trust your computer?

Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …

Don't miss

Cybersecurity news