Features

Review: Wi-Foo: The Secrets of Wireless Hacking

Review: Wi-Foo: The Secrets of Wireless Hacking

Despite the names (Konstantin Gavrilenko, Andrei Mikhailovsky, Andrew Vladimirov), the three people who wrote this book are based in the UK and are the founders of an IT security company there by the name of Arhout. They have decided to impart gems of knowledge to us about wireless networks and how to kept hackers out. Or alternatively if you possess a degree of moral flexibility, you could use this book to learn about hacking into said networks.

René Millman Dec 2 2004 12:00AM Security
Ethical hacking: Think like the bad guys

Ethical hacking: Think like the bad guys

Fancy learning the black art of hacking? Marcia Savage speaks to Jill Davis about a course that helps you to understand your enemies
Marcia Savage Dec 1 2004 5:25PM Security
From detection to prevention

From detection to prevention

2005 may be the year of the IPS tools, but not before they address persistent problems, says Andre Yee
Andre Yee Dec 1 2004 3:19PM Security
Let’s sue everybody! (or "why file sharing is not illegal")

Let’s sue everybody! (or "why file sharing is not illegal")

Imagine Xerox getting sued for creating machines that allow people to photocopy back issues of Time Magazine. Or Kodak getting sued for selling film that could take pictures of a Picasso painting. Perhaps Maxell should be sued for selling blank videotapes that could store copies of any movie starring Pauly Shore. (Well, perhaps some lawsuits can be justified after all.)
Wallace Wang Dec 1 2004 10:38AM Security
Building a secure future for telecoms

Building a secure future for telecoms

Security is fast becoming one of the telecoms’ industry’s ‘hot topics’. This reached a new peak in October when the TeleManagement Forum committed to adding a new security layer to the architecture of NGOSS (New Generation Operation Support Systems). But how has this come about? What’s changed so dramatically? And what issues do the new proposals address?
Dr. Prem Dec 1 2004 10:38AM Security
Understanding common wireless LAN attacks

Understanding common wireless LAN attacks

There is little doubt the enterprise Wireless LAN (WLAN) market is booming. Worldwide WLAN hardware revenue is expected to top $3.7bn USD in 2007 (Infonetics), with over 50% of enterprises deploying WLANs by 2006 (Meta Group).
Brian Mansfield Dec 1 2004 10:38AM Security
Review: Kaspersky Anti-Virus for Windows Workstations

Review: Kaspersky Anti-Virus for Windows Workstations

Earlier this year it was revealed Bill Gates is no longer the richest man in the world. That prize now goes to the owner of Swedish furniture giants Ikea, one Ingvar Kamprad. What does this show? It highlights that you don't necessarily need good assembly instructions to run a successful business.

David Quainton Nov 26 2004 12:00AM Security
IM security: virus throttling in scale-free networks

IM security: virus throttling in scale-free networks

Scientists have been studying the spread of biological disease for over a hundred years. The aim is to predict and thus avoid damaging epidemics, thus the name “epidemiology.” In recent years, some researchers have started applying the tools of epidemiology to help understand another form of common disease: computer viruses and worms.
Dr. Matthew Nov 24 2004 2:47PM Security
Why should anti-virus products employ heuristic detection?

Why should anti-virus products employ heuristic detection?

Once upon a time, in a galaxy not so far away, there were only a few computer viruses. Little more than a curiosity to most, they were relatively rare, slow spreading and in general, more of a mythological threat than a real one. The initial anti-virus products that were created to deal with these were perfectly adequate; updated once a month or so, the customers could be fairly sure that they would be protected. Fast-forward to today’s interconnected and always-on world, and the scale of the problem is orders of magnitude above where it was back in those early days.
Staff Writers Nov 24 2004 2:47PM Security
Calculating ROI for identity management projects

Calculating ROI for identity management projects

More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Dr. Martin Nov 24 2004 2:47PM Security
Don’t prevent communications – monitor them

Don’t prevent communications – monitor them

Personal computers and access to the Internet are becoming ubiquitous in both the commercial and public sector environments; even the UK government has committed to have all government services online by the end of 2005. So why are some organizations trying to prevent the use of the very communications technologies that this pervasiveness brings to our desktops, with all the advantages of speed and cost-saving that they offer?
Melville Carrie Nov 17 2004 10:33AM Security
Risky business

Risky business

An organisation’s ability to demonstrate robust business continuity processes is becoming a trading prerequisite for customers and suppliers alike. It is time to give risk management a place on the board.
Graeme Howe Nov 17 2004 10:33AM Security
Making security more SIMple

Making security more SIMple

Having a vast array of point security products in place will not keep your organisation safe in the face of a security breach. Security information management can provide the missing link.
Iain Chidgey Nov 17 2004 10:33AM Security
We have still got a long road to travel

We have still got a long road to travel

The recent SC Conference was an insight into how the industry currently stands, David Quainton reports
David Quainton Nov 12 2004 5:21PM Security
If you fail to prepare, be prepared to fail

If you fail to prepare, be prepared to fail

Many companies are leaving themselves open to attack by failing to follow a few simple security principles. Roy Hills gives us some helpful hints on how to tighten your firewall security in order to protect your network
Roy Hills Nov 12 2004 5:21PM Security
IPsec and SSL VPNs are able to co-exist

IPsec and SSL VPNs are able to co-exist

The combined weight of many marketing machines is trying to persuade us that SSL VPNs will soon replace the old methods of encrypting data, but Mike Smart believes there is still an argument for traditional IPsec VPNs
Mike Smart Nov 12 2004 5:20PM Security
It’s time to tame your networks

It’s time to tame your networks

Had enough of trying to keep track of the ever increasing number of devices that claim to protect your network? Tareque Choudhury explains how centralized management can be the solution to gaining control
Tareque Choudhury Nov 12 2004 5:19PM Security
Spate of new legislation is not welcomed by all

Spate of new legislation is not welcomed by all

David Quainton Nov 12 2004 5:19PM Security
Growth and a sense of quiet optimism

Growth and a sense of quiet optimism

For the first time, a survey of information security worldwide has calculated the growth of the profession, and also charted its skills and training needs. SC Magazine was given exclusive access to the results. Illena Armstrong reports
Illena Armstrong Nov 12 2004 5:17PM Security
Rise of certifications bumps up salaries

Rise of certifications bumps up salaries

According to recent research, salaries for qualified security professionals are on the up – reflecting the growing attitude that industry certifications are now outweighing commercial experience. Dan Ilett reports
Dan Ilett Nov 12 2004 5:17PM Security

Log In

  |  Forgot your password?