- Software [In]security: You Really Need a Software Security Group
- Dec 21, 2009
- Gary McGraw explains why having a software security group is necessary for a software security initiative.
|
- Spam: Unwanted Email from Hell
- Sep 9, 2008
- Andy Walker explains what spam is, where it comes from, and what to do about it.
|
- Stateful Web Application Firewalls with .NET
- Feb 9, 2007
- A Web Application Firewall (WAF), though still evolving, is crucial for strong application layer defense. It is possible to bridge WAF and session objects on the .NET platform to build a stateful WAF (SWAF). Security expert Shreeraj Shah covers the concept, implementation, and deployment of SWAF.
|
- The “Inverse Golden Rule” of Security
- Jan 4, 2002
- Want to check to see how secure your system and network might be? Ed Tittel tells you how.
|
- The 419 Scam, or Why a Nigerian Prince Wants to Give You Two Million Dollars
- Feb 8, 2002
- You might be surprised to discover that Americans are bilked out of over one million dollars a day by the Internet scam discussed in this article by Kyle Cassidy.
|
- The Bad Guys from Outside: Malware
- Apr 29, 2010
- In this chapter, you'll learn how malware works and why it presents such a threat to the enterprise.
|
- The Blown to Bits Interview: Your Life, Liberty, and Happiness After the Digital Explosion
- Jun 13, 2008
- Blown to Bits authors Hal Abelson, Ken Ledeen, and Harry Lewis talk about privacy and information availability in the digital age.
|
- The Dirty Dozen: The 12 Security Lapses That Make Your .Com, .Org, or .Net an Unwitting Collaborator with Cyberterrorists
- Mar 1, 2002
- Is your security ultra-tight? If not, your site may be unintentionally colluding in cyberterrorist activity. Frank Fiore and Jean François provide details.
|
- The Enemy: Protecting Your Organization from Blackhats
- Oct 12, 2001
- This sample chapter from Know Your Enemy shares what the Honeynet Project has learned about blackhats, focusing on those who use existing methods and tools to randomly search for and prey on organizations with highly vulnerable systems.
|
- The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
- Oct 7, 2010
- USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
|
- The Foundations of Distributed Message-Level Security
- Jun 11, 2004
- No Editor
|
- The Future of Identity
- Dec 7, 2007
- David Chisnall looks at the growing problem of identity theft and wonders whether the Internet can give us some ideas for addressing it.
|
- The Latest Salvo in the Spam Wars Appears in the Blogosphere: nofollow
- Jun 24, 2005
- There's a new HTML attribute in town called "nofollow" that's supposed to prevent weblog spam. In this article you'll learn about weblog spam, what the "nofollow" tag is, and how it might or might not help the situation.
|
- The Motives of Internet Criminals: Why They Want Our Money
- Feb 29, 2008
- Understand why — and how — internet criminals work their trade.
|
- The Technical Foundations of Hacking
- May 4, 2006
- This chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering topics like the Open Systems Interconnect (OSI) system and Transmission Control Protocol/Internet Protocol (TCP/IP). Sample questions with detailed answers from the exam are provided to help you prepare.
|
- TICSA Certification: Information Security Basics
- Nov 22, 2002
- Master AAA, the cornerstone of security as a systematic discipline. That's access control, authentication, and accounting. Although the details involved in implementing AAA vary from situation to situation, there are consistent basic requirements for all three security principles. Learn them here from Ed Tittel et al.
|
- Tips to Secure Your Home Wi-Fi Network
- Jul 10, 2009
- Eric Geier points out important steps beyond encryption to secure your home Wi-Fi network.
|
- Top 10 Social Engineering Tactics
- Jun 11, 2009
- Andrew Whitaker explains some of these common social engineering tactics used today to gain unauthorized access or acquire confidential information.
|
- Top 4 Software Development Protection Techniques and How to Defeat Them
- Dec 7, 2009
- Knowing weaknesses in different protection methods can help you choose the best techniques to safeguard your intellectual property.
|
- Top 5 Security Resolutions for New PCs
- Jan 28, 2009
- Randy Nash discusses common security practices we should all follow when setting up new gear.
|