Commentary & Insight From S?nnet Beskerming
Covering news on emerging threats, advice on good security practices, analysis, explanation of technical news items, and brief, accurate, non-biased synopsis of security-focussed technology trends, S?nnet Beskerming commentary is many things.
Whether you call it a blog, online journalism, or commentary on events, this is where you can find and search all relevant articles published by S?nnet Beskerming.
All articles will eventually be made available free of charge, however some content is initially only available to paying subscribers.
Available entries
This is Not an Email From the FBI
Posted in: Information Security
With a number of anti-virus companies and IT news sites calling it the biggest email based threat of 2005, new variants of the Sober email worm started hitting email inboxes in the last several days. Although the worm has employed various social engineering methods in an attempt to get victims to ex....
Posted: 28 November 2005 12:00
You May Not be as Secure as You Think
Posted in: Information Security
As laptop and notebook computers continue to increase in sales, more users are looking for a more portable method of connecting to the Internet. The current technology of choice is the 802.11 family of wireless connection specifications, generally known as Wi-fi, which almost all wireless network co....
Posted: 21 November 2005 12:00
Short, But Sweet
Posted in: Information Security
A memo from Microsoft Chairman, Bill Gates, was recently 'leaked' onto the Internet, and it heralds a fairly surprising change in direction for the company. Citing examples such as Google and Yahoo!, it appears that the head of Microsoft feels threatened by an environment where a small startup can c....
Posted: 14 November 2005 12:00
Of Bad Patches and Rootkits
Posted in: Information Security
When a company releases patches to fix their software, it gives hackers and security researchers a chance to 'reverse engineer' them to work out how the company has actually fixed the vulnerability, and in the case of the hackers it gives them a chance to understand how to create a workable exploit ....
Posted: 7 November 2005 12:00
Posts from December, 2024.