|
Crime? What crime?
2005-09-14 Hackers have become so detached from their crimes that they'll attack little old ladies and the American Red Cross, and feel perfectly fine about it. http://www.securityfocus.com/columnists/355 Security lessons from Katrina 2005-09-12 There are some important lessons that all security people should learn (but probably won't) from hurricane Katrina. http://www.securityfocus.com/columnists/354 Embedded market ripe for picking 2005-09-09 Embedded devices, from routers to refrigerators, have vulnerabilities but often there is no clear way to update and patch these systems. That makes some of them ripe for exploit. http://www.securityfocus.com/columnists/353 A changing landscape 2005-09-07 As the number of reported security breaches skyrockets compared to the number of vendor-published vulnerabilities, we have to look at the compromise of the average end-user as the inevitable result. http://www.securityfocus.com/columnists/352 Exploiting Cisco with FX 2005-08-31 This interview with FX discusses Cisco IOS exploitation, Michael Lynn's work, and what FX believes can be done when hacking IOS. http://www.securityfocus.com/columnists/351 The great firewall of China 2005-08-30 When a barrage of attacks and hacking attempts come from IP addresses traced back to China, and you don't do any business in China, do you block their entire IP address range and call it a day? http://www.securityfocus.com/columnists/350 Legal disassembly 2005-08-22 Is disassembly, decompiling and reverse engineering commercial software products legal? Can it be bound by copyright law or a software license agreement? http://www.securityfocus.com/columnists/349 It's only a matter of time... 2005-08-18 Apple is going to have to patch sooner once they start to be targeted by attackers. http://www.securityfocus.com/columnists/348 Jose Nazario discusses worms 2005-08-16 Interview with Jose Nazario to discuss worms and the design goals and propagation mechanisms behind them. http://www.securityfocus.com/columnists/347 Greasing the wheel with Greasemonkey 2005-08-08 With any new technology there are always a discussions about new functionality versus new security holes, and open source versus closed source software. Greasemonkey is a great example of what works and what doesn't. http://www.securityfocus.com/columnists/346 |
|
Privacy Statement |