-
stack smashing
Stack smashing is causing a stack in a computer application or operating system to overflow.31 Aug 2005
-
IronPort C-Series Messaging Gateway
Learn why Information Security magazine thinks this tool has an edge among antispam products31 Aug 2005
-
Recent Releases: Security product briefs, September 2005
Read about security products that launched in September 2005.31 Aug 2005
-
SSL VPN: Aventail's EX-1500
A review of Aventail's EX-150031 Aug 2005
-
Hot Pick: Aladdin Knowledge Systems' eSafe 5
Aladdin Knowledge Systems' eSafe 531 Aug 2005
-
Sunbelt Software's CounterSpy Enterprise 1.5 Product Review
In this product review, get the pros and cons of Sunbelt Software's CounterSpy Enterprise 1.5 features, such as antispyware scanning, centralized logging and reporting.31 Aug 2005
-
Security Management
Check Point Software Technologies' SmartCenter NGX31 Aug 2005
-
Single Sign-On
Imprivata's OneSign 2.831 Aug 2005
-
A Field Guide to Passive Reconnaissance and Indirect Attacks
Read a review of the security book: Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks.31 Aug 2005
-
Myfip's Titan Rain connection
LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks.31 Aug 2005
-
Passive fingerprinting: Applications and prevention
In this excerpt from the book Silence on the Wire, author Michal Zalewski discusses both malicious and beneficial uses for passive fingerprinting, and how to prevent successful passive fingerprinti...31 Aug 2005
-
Network safety relies on reaction time to Patch Tuesday
Taking a wait-and-see approach before installing updates on Patch Tuesdays can leave your company vulnerable to attacks, thanks to zero-day exploits.31 Aug 2005
-
Bugbear
Bugbear is a computer virus that spread in early October, 2002, infecting thousands of home and business computers. It is similar to an earlier virus, Klez, in terms of its invasion approach and r...30 Aug 2005
-
Layer 8: Choose your risk awareness battles carefully
Read at Your Own Risk30 Aug 2005
-
Publisher's Note
Getting It Together30 Aug 2005
-
Ping: Phil Zimmerman
Phil Zimmerman30 Aug 2005
-
Top 5 Hacker Tools: Google hacker, password cracker, WLAN detector
Read about five must-have hacker tools: WikTo, a Web scanner and Google hacking tool; Paros Proxy, a Web application manipulation proxy; Cain and Abel, a password sniffer/cracker; Winfingerprint, a...30 Aug 2005
-
Perspectives: Mergers and acquisitions open security risks
Integrating infrastructures acquired from other companies without considering security and risk first exposes enterprises to myriad problems.30 Aug 2005
-
Sizing Up E-mail Appliances
Is your organization inching along because of spam, malware and phishing attacks? We tested four e-mail appliances designed to clear the way for safe messaging. Here's how they measured up.30 Aug 2005
-
Best Advice
In this must-read compilation, we asked security luminaries to share their anecdotes, professional wisdom and success stories.30 Aug 2005
Security Management Strategies for the CIO