Home > Articles > Security

Security

722 Items

Sort by Date | Title

The Benefits of Hacking Embedded Devices
Dec 14, 2007
Paul Asadoorian describes why you'd want to "hack" embedded devices and which hardware and firmware choices are the best.
Pandemic Outbreak and the Impact of Quarantine on Business Operations
Dec 7, 2007
Randy Nash looks at the historical impact of pandemic outbreaks, the preparation and planning that has taken place, and the potential impact that could be expected.
The Future of Identity
Dec 7, 2007
David Chisnall looks at the growing problem of identity theft and wonders whether the Internet can give us some ideas for addressing it.
Endpoint Security: What's Missing?
Nov 30, 2007
Mark Kadrich describes a new process that will help us understand how our network technology interacts with our security technology.
Gaining Access to Target Systems Using Application and Operating System Attacks
Nov 21, 2007
This sample chapter explores basic and advanced techniques for gaining access by manipulating applications and operating systems.
Game Hacking 101
Nov 21, 2007
Gary McGraw and Greg Hoglund describe discuss techniques to prevent piracy and cheating in online games.
Fuzzing Frameworks
Nov 16, 2007
The authors of Fuzzing explore a number of open source fuzzing frameworks available today, including SPIKE, Autodafé, and GPF.
Preparing for a FISMA Security Audit
Nov 16, 2007
How do you prepare for an audit, and what do you do when the findings are issued? Randy Nash examines how to survive the audit gauntlet.
Static Analysis as Part of the Code Review Process
Nov 16, 2007
Learn why static analysis tools should be part of your security code review process.
Are Your Passwords Strong Enough? Advice from a Software Tester
Nov 9, 2007
Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
Managing Users and Security in openSUSE Linux
Nov 2, 2007
Michael McCallister shows how to sett up user accounts and create and manage groups that work together.
Virtual Lock Picking of Windows Mobile Password Managers
Nov 2, 2007
Seth Fogie illustrates just how easy it can be for an attacker to "pick open" the security measures used to protect your sensitive data.
Desktop Search Tools - A Security Investigator's New Best Friend
Oct 26, 2007
John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
Inside Mobile-spy "Spouseware," Part 2
Oct 19, 2007
Seth Fogie tries to hijack Mobile-spy for Windows Mobile phones to make it more malicious.
Inside Mobile-spy "Spouseware," Part 1
Oct 12, 2007
Seth Fogie examines a "spouseware" program to see how it performs its eavesdropping functions.
Information as a Weapon of Mass Destruction
Oct 5, 2007
pdp (architect) discusses just a few of the many disciplines that largely involve information as a tool to spread false beliefs and fears.
Cyber Warfare: Reality or Box Office Hit?
Sep 28, 2007
Randy Nash searches for a working definition of cyber warfare, looks at the historical profile of attacks, and discusses the potential of a devastating electronic Pearl Harbor.
ID Theft: Before and After
Sep 21, 2007
Learn how to protect yourself from identity theft.
Owning the Wireless Camera (and Its User)
Sep 14, 2007
Seth Fogie takes a second look at the web interface of the AXIS 207W network camera.
Abusing and Misusing Wireless Cameras
Sep 7, 2007
Security expert Seth Fogie takes a look at exploits relating to a popular wireless surveillance camera.

<< < Prev Page 10 11 12 13 14 Next >