Amol Sarwate,

Recent articles by Amol Sarwate,

Hot or not: ActiveX vulnerabilities

Hot or not: ActiveX vulnerabilities

ActiveX vulnerabilities have posed a security challenge for some time, and they're likely to be a challenge for quite some time to come.
Amol Sarwate, Sep 18 2009 12:37PM Security
Hot or not: Software update vulnerabilities

Hot or not: Software update vulnerabilities

The automatic update features in many software applications are proving to be vulnerable to attack. Hackers are taking notice. You should, too.
Amol Sarwate, Nov 20 2008 1:56PM Security
What you need to know to keep Mac OS X secure

What you need to know to keep Mac OS X secure

Just a few years ago, Apple commanded only a small fraction of the computer market.
Amol Sarwate, Sep 22 2008 4:12PM Security
Winning against the phishing assault

Winning against the phishing assault

A look at two of the signing technologies PayPal plans to use to improve sent email authentication, which would allow ISPs to drop each email that isn't properly verified.
Amol Sarwate, May 2 2008 1:53PM Security
Hot or Not: Virtualisation Security

Hot or Not: Virtualisation Security

What are the potential security implications of virtualisation? The answer is: they are considerable.
Amol Sarwate, Apr 8 2008 3:21AM Security
Hot or Not: Vista SP1 Scheduled For Widespread Release

Hot or Not: Vista SP1 Scheduled For Widespread Release

It's been some time in the making, but Microsoft soon will make its first service pack for Vista widely available. While the final version started shipping to manufacturers earlier this month, Microsoft says it's making some final tweaks to its distribution channels before general availability in a few weeks. So what can we expect?
Amol Sarwate, Mar 12 2008 3:48PM Security
Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system

Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system

The new scoring system promises to make it easier for security managers and the IT industry to better measure the real-world risks associated with software flaws.
Amol Sarwate, Sep 11 2007 3:03PM Security
Hot or not: Local buffer overflow vulnerabilities

Hot or not: Local buffer overflow vulnerabilities

Buffer overflows have long been a primary vector of attack against computer systems — and the rise of local buffer overflow vulnerabilities and zero-day attacks makes it a problem that's likely to grow more troublesome.
Amol Sarwate, May 29 2007 9:58AM Security
Hot or not: Software as a service

Hot or not: Software as a service

SaaS is no longer just about CRM — more security vendors are revamping their applications to be delivered as services over the web.
Amol Sarwate, May 7 2007 2:57PM Security
Hot or not: Reverse code engineering

Hot or not: Reverse code engineering

Hot: It's one of the primary methods that malicious hackers use to find new application and operating system vulnerabilities.
Amol Sarwate, Mar 26 2007 8:03AM Security
Hot or not: Third-party patches

Hot or not: Third-party patches

Last month's race between a group of security researchers who promised to disclose, every day, a newfound vulnerability in the Apple OS X platform, and an opposing group, led by a former Apple employee, to independently plug those security flaws, has sparked new debate around the validity of third-party security patches.
Amol Sarwate, Feb 19 2007 8:00AM Security
Hot or not: Early Vista flaws

Hot or not: Early Vista flaws

There's been plenty of talk about the security capabilities of Windows Vista, but what's at the heart of the security defenses within Microsoft's latest operating system? This article aims to take a close look at the technology that will make a difference.
Amol Sarwate, Jan 10 2007 10:29PM Security
Hot or not: Network embedded device security threats

Hot or not: Network embedded device security threats

Hot: Expect attackers to increasingly target networked, multifunction devices, such as high-end printers, scanners and fax machines, as these devices continue to grow more sophisticated and move away from proprietary operating systems and software.
Amol Sarwate, Dec 5 2006 9:00AM Security

Log In

  |  Forgot your password?