• November 30, 2005 30 Nov'05

    Apple patches 13 flaws in Mac OS X

    Attackers could gain unauthorized system access, compromise sensitive data and launch malcode by exploiting a series of security holes in Mac OS X. But patches are available.  Continue Reading

  • November 29, 2005 29 Nov'05

    How to tame Google Desktop

    Although not classified as spyware, if left unmanaged and unmonitored desktop search engines, like Google Desktop, can introduce serious security concerns. This tip examines these risks and explains how to block or secure Google Desktop in the ...  Continue Reading

  • November 29, 2005 29 Nov'05

    Sun fixes multiple Java flaws

    Attackers could exploit flaws in the Java Runtime Environment and Management Extensions to read and write local files or execute applications.  Continue Reading

  • November 28, 2005 28 Nov'05

    Opera: Another contender in the browser wars

    Opera Software removed the ad banners and dropped the licensing fees from its browser, making Opera a viable alternative to Internet Explorer. Learn how Opera compares to Firefox in terms of security measures and the drawbacks of using an ...  Continue Reading

  • November 28, 2005 28 Nov'05


    Zotob is a computer worm used by an attacker to gather personal and financial information from computers running Microsoft Windows that have a buffer overflow vulnerability. Zotob, which has several variants, is an outgrowth of a worm called Mytob.  Continue Reading

  • November 28, 2005 28 Nov'05

    Binary over JPEG

    In this Ask the Expert Q&A, Michael Cobb explains what "binary over JPEG" is and how hackers use this mechanism to exploit system vulnerabilites.  Continue Reading

  • November 28, 2005 28 Nov'05

    How Kerberos, PKI and IPsec interoperate

    In this Ask the Expert Q&A, our identity and access management expert explains how these three unrelated systems interoperate to authenticate and manage digital certificates.  Continue Reading