Email Alerts
-
OpenOffice security: Concerns when moving from Microsoft Office
What are the major OpenOffice security concerns when transitioning from Microsoft Office? Security expert Michael Cobb explains the potential vulnerabilities between open source and commercial software. Ask the Expert
-
The benefits of application proxy firewalls
Michael Cobb explains the benefits of application proxy firewalls as compared to other firewall technologies including packet filtering firewalls and stateful inspection firewalls or circuit-level gateways. Ask the Expert
-
How do hackers bypass a code signing procedure to inject malware
In this expert Q&A, Michael Cobb reveals how malicious applications can actually be approved by Symbian's Express Signing procedure. Ask the Expert
-
How to secure a .pdf file
In this expert Q&A, Michael Cobb explains how to avoid malicious content that is embedded into .pdf documents. Ask the Expert
-
Why should we place data files on a separate partition than the OS?
You may have always been taught to install applications on a different partition than the OS, but do you actually know why? Ask the Expert
-
When to use the service features of the Metasploit hacking tool
In this expert response, Michael Cobb explains why offloading resource-intensive penetration testing tasks to Metasploit may be an attractive option. Ask the Expert
-
How to manage patches for Adobe
If you're dealing with a continuous flow of patches, particularly from Adobe, application security expert Michael Cobb feels your pain. Ask the Expert
-
How secure are iPhone App Store mobile applications?
Expert Michael Cobb reviews the steps that Apple has taken to ensure the quality and safety of any applications developed for the iPhone. Ask the Expert
-
Can virtualized applications interact without permission?
If a guest OS in a virtualized system is compromised, it could theoretically go through the hypervisor layer and compromise the rest of the guest operating systems. But what about an environment with virtualized applications? Ask the Expert
-
What is the best way to manually test for buffer overflows?
There are two ways of reviewing a program for buffer overflows. Michael Cobb explains how to examine a program's source code and file code. Ask the Expert
Security Management Strategies for the CIO