Expert analysis
Network Associates Fights Spam
The McAfee Security division of Network Associates, Inc. announced a new initiative to combat spam through increased education, awareness, and technology, expanding upon the …
The IP Smart Spoofing
This paper describes a new technique for spoofing an IP address with any networking application. IP spoofing is not new and various hacking tools have been developed to …
Check Point VPN-1/FireWall-1 added to Computer History Museum
Check Point VPN-1/FireWall-1 was presented to the Computer History Museum during a recent visit to the museum by Check Point’s executives. Established in 1996, the …
No more security patches for SuSE Linux 7.0
SuSE announced today on their suse-security-announce mailing list, that with the release of SuSE Linux 8.1 i386 (ftp available version), SuSE Linux 7.0 will be discontinued. …
DallasCon Wireless Security Conference for your wireless needs
Wireless security is one of the most interesting topics in the Information Security lately. More and more companies rely on wireless technology, which automatically means that …
McAfee anti virus included on MSN 8 cd-rom
McAfee Security Consumer, a division of Network Associates, announced a partnership with MSN. According to the terms, McAfee VirusScan Online is added to the MSN 8 cd-rom, …
Countering cyber war
For many, the term cyber war conjures up images of deadly, malicious programmes causing computer systems to freeze, weapon systems to fail, thwarting vaunted technological …
Dealing with External Computer Security Incidents
Dealing with computer security incidents is extremely difficult. There are many ways that incidents can occur and many types of impact they can have on an organization. There …
RSA Security collaborates with AMD to boost security
RSA Security Inc. announced they are collaborating with Advanced Micro Devices to deliver optimized encryption software for current AMD Athlon processors and upcoming AMD …
Check Point expands Security Management Architecture product line
Check Point Software Technologies, one of the key players in the VPN and firewall markets, announced two add-ons to their SMART (Security Management Architecture) product line …
Open Source Digital Forensics Tools: The Legal Argument
This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and …
Can you trust your computer?
Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments