Beiber Labs is a nice resource. And the compliments are very much appreciated!
Richard Stiennon delivers a timely, succinct exploration of cyber threats, hack attacks, crime on the web, and information warfare.
Now Microsoft is even co-opting Unix hacker terms. Rootkits were originally programs that helped a hacker cover their tracks.
This is great news. E*Trade is offering strong authentication to its online brokerage customers.
Here is a breaking news story from the Wall Street Journal this morning. Bank of America Corp.
Yesterday I talked about the risk to the computing world inherent in one platform everywhere. Many people have suggested that this is why Macs and other platforms should be tossed into the mix.
There is much to be said for standards. Standard weights and measures were the key to commerce.
I know it is late but here are my predictions for 2005. I actually did write these in December but since none of them have not come true yet now is the time to post them.
Great article on CNAC by Danny Bradbury at Computer Weekly.Originally published at www.
A series of developments in network security are leading to the emergence of a comprehensive solution that could make the network so resilient that it is impervious to most attacks. Although no product vendor has proposed the specific combination discussed here all of the pieces are available today and early adapters could assemble the pieces.
In the relatively short history of Internet Security it has been a long time since Cisco proposed their solution to the host security problem. It was July-August of 2003 that MSBlaster, a worm that infected most enterprises because laptops brought it in with them, highlighted yet another problem with enterprise security.