Expert analysis
RSA Security collaborates with AMD to boost security
RSA Security Inc. announced they are collaborating with Advanced Micro Devices to deliver optimized encryption software for current AMD Athlon processors and upcoming AMD …
Check Point expands Security Management Architecture product line
Check Point Software Technologies, one of the key players in the VPN and firewall markets, announced two add-ons to their SMART (Security Management Architecture) product line …
Open Source Digital Forensics Tools: The Legal Argument
This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and …
Can you trust your computer?
Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …
DBCC SHOWTABLEAFFINITY buffer overrun
Martin Rakhmanoff wrote this article to (better) document the process of finding and exploiting buffer overrun bugs. Provided sample code is written for Microsoft SQL Server …
ICSA Labs announces Q3 2002 certifications
ICSA Labs, an independent division of TruSecure Corporation announced that it has certified sixteen products in Q3 2002. George Japak, vice president of ICSA Labs said: …
Microsoft releases another pack of security bulletins
In another combo pack, Microsoft released three security bulletins. The bulletins which are labeled from moderate to critical, deal with Microsoft Word and Excel, Microsoft …
InfoSecU enterprise licensing announced
Pittsburgh based, privately owned security company RedSiren Technologies, announced enterprise licensing for their online information security training courses Security …
Network Associates launches a professional services organization
Network Associates announced opening of a new strategic organization that will offer their customers comprehensive network and security consulting services. “Network …
Security Online – Some basic IT hygiene tips
In a previous article dealing with online security prompted many readers with home PCs to ask for advice on how to stay safe and still get the most out of the …
Interview with Saumil Shah, Security Researcher
Saumil Shah is a security researcher and is one of the authors of Web Hacking: Attacks and Defense. How did you gain interest in computer security? My interest in computer …
PGP 8.0 Public Beta available for download
During the RSA Conference 2002 Europe in Paris we had another opportunity to talk with Jon Callas, Chief Technical and Chief Security Officer at newly founded PGP Corporation. …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month