Expert analysis
Dealing with External Computer Security Incidents
Dealing with computer security incidents is extremely difficult. There are many ways that incidents can occur and many types of impact they can have on an organization. There …
RSA Security collaborates with AMD to boost security
RSA Security Inc. announced they are collaborating with Advanced Micro Devices to deliver optimized encryption software for current AMD Athlon processors and upcoming AMD …
Check Point expands Security Management Architecture product line
Check Point Software Technologies, one of the key players in the VPN and firewall markets, announced two add-ons to their SMART (Security Management Architecture) product line …
Open Source Digital Forensics Tools: The Legal Argument
This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and …
Can you trust your computer?
Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …
DBCC SHOWTABLEAFFINITY buffer overrun
Martin Rakhmanoff wrote this article to (better) document the process of finding and exploiting buffer overrun bugs. Provided sample code is written for Microsoft SQL Server …
ICSA Labs announces Q3 2002 certifications
ICSA Labs, an independent division of TruSecure Corporation announced that it has certified sixteen products in Q3 2002. George Japak, vice president of ICSA Labs said: …
Microsoft releases another pack of security bulletins
In another combo pack, Microsoft released three security bulletins. The bulletins which are labeled from moderate to critical, deal with Microsoft Word and Excel, Microsoft …
InfoSecU enterprise licensing announced
Pittsburgh based, privately owned security company RedSiren Technologies, announced enterprise licensing for their online information security training courses Security …
Network Associates launches a professional services organization
Network Associates announced opening of a new strategic organization that will offer their customers comprehensive network and security consulting services. “Network …
Security Online – Some basic IT hygiene tips
In a previous article dealing with online security prompted many readers with home PCs to ask for advice on how to stay safe and still get the most out of the …
Interview with Saumil Shah, Security Researcher
Saumil Shah is a security researcher and is one of the authors of Web Hacking: Attacks and Defense. How did you gain interest in computer security? My interest in computer …
Featured news
Resources
Don't miss
- Microsoft May 2026 Patch Tuesday: Many fixes, but no zero-days
- Stealthy hackers exploit cPanel flaw in active backdoor campaign (CVE-2026-41940)
- Amazon Quick authorization bypass let users reach blocked AI chat agents
- Download: The IT and security field guide to AI adoption
- JetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)