You may be wondering about IDS and IPS, and which system has a proven track record, excellent performance and accuracy, and what will be around for the long term. If you haven’t heard of Snort, you may be surprised at how much one of the best offers for free.
News and information about security and vulnerability testing
The latest news and information about security and vulnerability testing and reviews of leading products.
The 2nd article in this series on the principle of least privilege examines privilege escalation and the related risks of users obtaining more or different privileges than the developer of an application intended possible. Vulnerabilities become exploits. Let’s look at how this happens.
Port scanners are key tools for network and systems security professionals. Fortunately, the best of these are free and/or Open Source. This article examines and compares the top five free port scanners available. If you don’t already have at least one in your kit, get one of these ASAP.
Penetration Testing uses a variety of specialized tools to make testing far faster and more effective at discovering vulnerabilities. Five of the top tools are highlighted in this article. We examine why these penetration testing tools are great at discovering vulnerabilities and when to use them.
Penetration Testing can seem like a black art to a beginner. To an IT veteran not specializing in security it may seem as simple as buying a product and clicking a few buttons. Neither of these ideas is true. Here we’ll examine how to get started with pen testing and how to do it well.
Windows security has been given high priority in Vista development. The ten top security reasons to use Windows Vista will show why Vista is the most secure desktop operating system ever built by Microsoft – much more difficult to exploit. The best Vista security reasons include valuable tips, too.
Email is always susceptible to attacks from viruses & email worms. To get a clear view of email security threats, testing email security is the way to go. Testing Email Security ensures that you are with the right email provider & your email is always secure from spam & other threats. Read more…
Is your computer secure? Is your network secure? Here’s a list of ten free security tests that you can use to test whether your computers and network are secure.
PGP Desktop 9.9 is a software suite for secure email, safe storage on disks, protected shared storage, as well as armored or self-decrypting archives. PGP Desktop provides individuals and companies comprehensive security for mobile computers and desktops by cryptography at an affordable price.
Ever wonder if what we type in a browser, email, chat, password managers and other popular application is safe from keyloggers or snoopers? In this article, I’m reviewing a product called KeyScrambler Professional, anti-keylogging protection and put it into action using Anti-Keylogger Tester.
Check out these free resources that will allow you to look for common application level attacks.
When it comes to testing the security posture of a target application, nothing is more indicative than supplying the application with random data and seeing it crash. The idea behind fuzzing is to automate the generation and feeding of data that will identify flaws in a target application.
A peek into the psyche of young hackers, a.k.a. Script Kiddies.
A few years ago, small business owners could set up a new computer or server and leave it on auto-pilot for the next few years. However, with so many criminals manipulating “botnets” of hacked computers, companies must change their approach to network maintenance.
You can have an anti-virus solution, security cameras, spam filters, firewalls, and password-protected screen savers, but, your small business PCs still may not be totally secure.
Security testing and auditing is essential in order to test the effectiveness of your defences and establish areas in which your security plan needs to be updated or improved. This article explains how small business can keep costs down by DIYing the process.