Expert analysis
Interview with Jeremy Anderson, Co-Author of “Multitool Linux”
Jeremy Anderson teaches UNIX classes at Hennepin Technical College. He has expertise in UNIX, Linux, Perl, C/C++, and Java programming. Jeremy is also one of the authors of …
Interview with Steven Murphy, Co-Author of “Multitool Linux”
Who is Steven Murphy? I am a systems analyst principal working on the electronic commerce team for HealthPartners in Minnesota. I enjoy a simple life relaxing in my hot tub in …
The Trivial Cisco IP Phones Compromise
The following paper lists several severe vulnerabilities with Cisco systems’ SIP-based IP Phone 7960 and its supporting environment. These vulnerabilities lead to …
America’s National Cybersecurity Strategy: Same Stuff, Different Administration
Today the White House releases its long-awaited “National Strategy To Secure Cyberspace.” This high-level blueprint document (black/white or color), in-development …
HNS Coverage from RSA Conference 2002 Europe
Here are the news from the conference as they are released: Scope on Attix5 secure backuping software Bridicum receives 4.2 million Euros investment How the press spreads FUD …
NetBSD Releases a Batch of Security Advisories
With the release of NetBSD 1.6, the NetBSD project published a batch of Security Advisories (some of which are updates). * 2002-006 buffer overrun in libc/libresolv DNS …
Cross-Site Scripting Vulnerabilities
Have you ever mistyped the address of a web site and received a message like “Error – page name could not be found” or “The page you requested: page …
Securing an Internet Name Server
Domain name system (DNS) servers translate names suitable for use by people (such as www.example.com) into network addresses (e.g., 192.168.4.22) suitable for use by …
Managed Vulnerability Assessment
Hacker attacks are no longer limited to high-profile organizations such as banks and governments. Automated tools have made it easier to identify and exploit network …
Keep e-commerce secure by disconnecting your servers from the Internet
While it sounds strange, disconnecting your e-commerce servers from the Internet is exactly what SpearHead Security Technologies would have you do – using their NetGAP …
Interview with Stuart McClure, President and CTO of Foundstone
Stuart Stuart McClure is the President and CTO of Foundstone, a successful security author, speaker, and teacher. Stuart holds a B.A. degree from the University of Colorado, …
Astaro Content Filtering Process
Traditional Internet filtering methods depend on manually compiled blocking lists, individual ratings or online applied heuristics algorithms. These methods are, for the most …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025