New & Notable


Ghidra reverse-engineering release meets praise and concern

The NSA's reverse-engineering tool, Ghidra, was released to the public and despite some initial concerns experts are generally bullish on the prospects for the free software.

Problem Solve

What's the truth behind the fall spike in DDoS attacks?

DDoS attack patterns indicate a sharp escalation in the fall. Why does that occur and what can be done to guard against these attacks?

Problem Solve

Nine email security features to keep phishing at bay

Check out nine email security features that can help protect you from phishing attacks. First, make sure they're enabled on your email system configuration, and if not, start your wish list.


U.S. election security remains at risk

Fragile electronic voting systems and the weaponization of social media continue to menace U.S. election systems as presidential candidates ramp up their 2020 campaigns.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit. The term has its roots in the military and is often associated with the capacity of executable malicious code  to do damage. Technically, the payload of a ...

  • Get Started


    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a ...

  • Get Started

    Using Mimikatz to dump Windows credentials

    In this Mimikatz tutorial, learn about the password and credential dumping program, where you can acquire it and how easy it makes it to compromise system passwords.

View All Get Started


Videos, Podcasts, Photo Stories and Infographics

Vendor Resources

Blog: Security Bytes

Sections from across SearchSecurity