-
EV SSL certificates won't stop phishers, researchers say
Two researchers call Extended Validation (EV) SSL certificates a Band-Aid approach, and share their research of the phishing underground.31 Jul 2008
-
Hoffman to demonstrate new hacking techniques
Researcher to demonstrate hacking methods that enable malware authors to shield their programs from analysis.31 Jul 2008
-
Researchers reveal new blacklisting method
Highly predictive blacklisting produces custom lists that researchers say provide more effective threat intelligence.31 Jul 2008
-
IBM X-Force report critical of independent security researchers
Vendor research organizations discover the most critical vulnerabilities and clamp down on details minimizing exploit code in the wild, report says.30 Jul 2008
-
Is there a published standard or guideline for system hardening?
When hardening a system, what specific standards or guidelines should information security pros adhere to? Security management expert Mike Rothman explains.29 Jul 2008
-
Black Hat Las Vegas 2008: News, podcasts and videos
The annual Black Hat conference is never boring. Check out the latest news, podcasts and videos direct from Caesars Palace in Las Vegas.29 Jul 2008
-
What are good features to look for in access control software?
When supporting environments with HID card readers and proxy cards, what qualities should control access software have? Identity and access management expert Joel Dubin weighs in on software and im...29 Jul 2008
-
Gary McGraw on secure software development
Gary McGraw of Cigital Inc. explains why better secure coding could help thwart future Web 2.0 attacks. He says the industry is making progress.29 Jul 2008
-
Motorola to acquire wireless security firm AirDefense
Analysts say the acquisition would strengthen Motorola's hand against WLAN infrastructure competitors Cisco and Aruba.29 Jul 2008
-
CISSP Essentials training: Domain 2, Access Control
In this video, get a free introduction to Domain 2 of the CISSP exam's "Common Body of Knowledge" covering access control topics like administration, practices, models and more.28 Jul 2008
-
Sophos to acquire mobile data protection company Utimaco
The independent mobile data protection market continues to shrink with Sophos' endpoint encryption acquisition.28 Jul 2008
-
DNS flaw handling leaves Kaminsky pleased
Network security researcher, Dan Kaminsky sheds light on how he discovered the DNS cache poisoning flaw.25 Jul 2008
-
evil twin
In security, an evil twin is a home-made wireless access point (hot spot) that masquerades as a legitimate one to gather personal or corporate information without the end-user's knowledge... (Conti...24 Jul 2008
-
Quiz: The new school of enterprise authentication
Take this five-question quiz to test your knowledge of Mark Diodati's enterprise authentication lesson.24 Jul 2008
-
Dan Kaminsky on DNS, Web attacks
Noted network security researcher Dan Kaminsky, director of penetration testing at IOActive, shares his research on DNS and Web-based attack techniques.24 Jul 2008
-
Smartphones opening up enterprise risks
A new survey found more consumers using their smartphones to access sensitive corporate data opening huge security gaps for enterprises.24 Jul 2008
-
DNS exploit code released by Metasploit founder
Experts say DNS attacks against unpatched servers are imminent.24 Jul 2008
-
The steps of privileged account management implementation
Privileged accounts have always been difficult to secure, and they remain the focal point for the insider attack. Luckily, an emerging class of privileged account management products is here to hel...24 Jul 2008
-
Initial virtualization costs could outweigh benefits
It could be costly for companies to sort out the new governance, oversight and manageability issues being introduced by virtualized environments.23 Jul 2008
-
Apple iPhone mail, Safari prone to spoofing
A security researcher discovered some design flaws in Apple's iPhone that could leave the smartphone vulnerable to phishers and spammers.23 Jul 2008
Security Management Strategies for the CIO