Microsoft has decided to issue a special patch outside its usual patchday rhythm for all its Internet Explorer versions to close a severe vulnerability issue. Downloads of Firefox have accordingly skyrocketed.more »
OpenVAS Exploring the OpenVAS vulnerability scannerNov 30, 2009
If you prefer to travel light and free, try OpenVAS, a GPLed fork of the Nessus scanning tool.more »
Security Visualization Tools Tools for visualizing IDS outputAug 31, 2009
Spot intruders with these easy security visualization tools.more »
Intrusion 101 A guided tour to someone else's networkAug 31, 2009
You need to think like an attacker to keep your network safe. We asked security columnist Kurt Seifried for an inside look at the art of intrusion.more »
Security Lessons Denial of service made easyJul 15, 2009
A slow death for the default configuration.more »
Forensics in Freiburg Hacker trainer for law enforcement agentsApr 30, 2009
A former intrusion specialist is training a gathering of European law enforcement agents in how the bad guys work on the Internet. Contributing editor Markus Feilner stops in for a lesson in attack techniques.more »
Security Lessons How hacking got easyOct 31, 2008
When it comes to security, public disclosure of vulnerabilities and working exploit code is now common. We look at why this can be both harmful and helpful to securing your systems.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm