Features

More rigour, less geek, more respect

More rigour, less geek, more respect

In my position, I get to read an awful lot of submitted articles, supposedly from infosec professionals with centuries of experience between them. And I also get along to a lot of conferences where many of the same people share their wisdom with the rest of the world.
Ron Condon Sep 5 2005 5:04PM Security
Debate» Should governments force the ISPs to provide clean bandwidth?

Debate» Should governments force the ISPs to provide clean bandwidth?

Jonathan Mepsted Sep 5 2005 4:57PM Security
Zotob shows a dark future

Zotob shows a dark future

Perhaps the year's most dangerous and certainly most headlined worm hit the internet in August, shutting down a number of high-profile organisations.
David Quainton Sep 5 2005 4:00PM Security
Me and my job

Me and my job

Staff Writers Sep 5 2005 3:54PM Security
Pentesting is not the only route

Pentesting is not the only route

“Almost all security breaches are completely unrelated to penetration issues"
Lee Farman Sep 5 2005 3:39PM Security
Phrack falls with the leaves

Phrack falls with the leaves

The end of August also saw the end of Phrack magazine (www.phrack.org). Or did it? There are rumours about a revival, but Phrack as it stands has breathed its last.
Nick Barron Sep 5 2005 3:27PM Security
The pleasures of qualified success

The pleasures of qualified success

Like any industry, information security has taken a while to mature and be recognised as a distinct discipline in business.
Brian Shorten Sep 5 2005 3:13PM Security
Worms twist to a new tune

Worms twist to a new tune

August’s exploits point to a new level of ability in worms and hackers, says Gunter Ollmann
Gunter Ollmann Sep 5 2005 3:00PM Security
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Ron Condon Sep 5 2005 2:45PM Security
Wireless security is broken and it doesn’t matter.

Wireless security is broken and it doesn’t matter.

It’s hard to pick up an industry magazine or a newspaper without finding an article about the latest security flaw in one of the wireless protocols. Companies are scrambling to fix the problem by throwing money and resources at new standards and products. Organizations everywhere are wasting financial resources on technologies that prevent their users from taking advantage of wireless networks because of perceived security reasons.
Thomas Gilbert Aug 31 2005 11:14AM Security
Spotting the pharming websites

Spotting the pharming websites

The great British broadcaster Alan Partridge once proposed an innovative programme idea for television called Monkey Tennis. Although more varied, less predictable and arguably better TV viewing than normal tennis, the idea was shelved over some pretty sketchy concerns that the monkeys would never be up to the job.
Jonathan Mepsted Aug 30 2005 11:43AM Security
Federal law needs to cover everyone

Federal law needs to cover everyone

We've all heard about the many private companies whose lackadaisical approach to security ended in the theft of customers' critical data. But it has been rare to hear about compromises to government agencies' IT security mechanisms, which ended in a citizen's identity being compromised.
Illena Armstrong Aug 26 2005 4:50PM Security
Debate» Security researchers should be paid for finding vulnerabilities in code

Debate» Security researchers should be paid for finding vulnerabilities in code

Kip McClanahan Aug 26 2005 3:41PM Security
The dark side of backup

The dark side of backup

Marcia Savage Aug 26 2005 3:25PM Security
Me and my job

Me and my job

Staff Writers Aug 26 2005 3:11PM Security
ID is key in phishing battle

ID is key in phishing battle

Don’t lower your guard – criminals will always find new ways to perpetrate fraud
David Zumwalt Aug 26 2005 2:33PM Security
We must all play our part

We must all play our part

Peter Stephenson,CeRNS, Aug 26 2005 2:25PM Security
Why biometrics might just bite back

Why biometrics might just bite back

Tim Mather Aug 26 2005 2:00PM Security
We all have a role to play

We all have a role to play

Do we need federal laws to prevent data theft? Or should industry take point? Illena Armstrong hears from Tom Davis, a Congressman with the power to decide
Illena Armstrong Aug 26 2005 12:22PM Security
Strange brew

Strange brew

Blended threats are the next big thing for those who want to attack your firm. It’s time to get on the case, says Jim Carr
Jim Carr Aug 26 2005 11:32AM Security

Log In

  |  Forgot your password?