Home > Articles > Security
Security
722 Items
Sort by Date | Title
- The Benefits of Hacking Embedded Devices
- Dec 14, 2007
- Paul Asadoorian describes why you'd want to "hack" embedded devices and which hardware and firmware choices are the best.
|
- Pandemic Outbreak and the Impact of Quarantine on Business Operations
- Dec 7, 2007
- Randy Nash looks at the historical impact of pandemic outbreaks, the preparation and planning that has taken place, and the potential impact that could be expected.
|
- The Future of Identity
- Dec 7, 2007
- David Chisnall looks at the growing problem of identity theft and wonders whether the Internet can give us some ideas for addressing it.
|
- Endpoint Security: What's Missing?
- Nov 30, 2007
- Mark Kadrich describes a new process that will help us understand how our network technology interacts with our security technology.
|
- Gaining Access to Target Systems Using Application and Operating System Attacks
- Nov 21, 2007
- This sample chapter explores basic and advanced techniques for gaining access by manipulating applications and operating systems.
|
- Game Hacking 101
- Nov 21, 2007
- Gary McGraw and Greg Hoglund describe discuss techniques to prevent piracy and cheating in online games.
|
- Fuzzing Frameworks
- Nov 16, 2007
- The authors of Fuzzing explore a number of open source fuzzing frameworks available today, including SPIKE, Autodafé, and GPF.
|
- Preparing for a FISMA Security Audit
- Nov 16, 2007
- How do you prepare for an audit, and what do you do when the findings are issued? Randy Nash examines how to survive the audit gauntlet.
|
- Static Analysis as Part of the Code Review Process
- Nov 16, 2007
- Learn why static analysis tools should be part of your security code review process.
|
- Are Your Passwords Strong Enough? Advice from a Software Tester
- Nov 9, 2007
- Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
|
- Managing Users and Security in openSUSE Linux
- Nov 2, 2007
- Michael McCallister shows how to sett up user accounts and create and manage groups that work together.
|
- Virtual Lock Picking of Windows Mobile Password Managers
- Nov 2, 2007
- Seth Fogie illustrates just how easy it can be for an attacker to "pick open" the security measures used to protect your sensitive data.
|
- Desktop Search Tools - A Security Investigator's New Best Friend
- Oct 26, 2007
- John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
|
- Inside Mobile-spy "Spouseware," Part 2
- Oct 19, 2007
- Seth Fogie tries to hijack Mobile-spy for Windows Mobile phones to make it more malicious.
|
- Inside Mobile-spy "Spouseware," Part 1
- Oct 12, 2007
- Seth Fogie examines a "spouseware" program to see how it performs its eavesdropping functions.
|
- Information as a Weapon of Mass Destruction
- Oct 5, 2007
- pdp (architect) discusses just a few of the many disciplines that largely involve information as a tool to spread false beliefs and fears.
|
- Cyber Warfare: Reality or Box Office Hit?
- Sep 28, 2007
- Randy Nash searches for a working definition of cyber warfare, looks at the historical profile of attacks, and discusses the potential of a devastating electronic Pearl Harbor.
|
- ID Theft: Before and After
- Sep 21, 2007
- Learn how to protect yourself from identity theft.
|
- Owning the Wireless Camera (and Its User)
- Sep 14, 2007
- Seth Fogie takes a second look at the web interface of the AXIS 207W network camera.
|
- Abusing and Misusing Wireless Cameras
- Sep 7, 2007
- Security expert Seth Fogie takes a look at exploits relating to a popular wireless surveillance camera.
|