Site Network: Beskerming.com | Skiifwrald.com | Jongsma & Jongsma

Innovation in Information Security

Coverage of important Information Security and Information Technology news and events from the research team at S?nnet Beskerming.

Username: | Password: Contact us to request an account

Commentary & Insight From S?nnet Beskerming

Covering news on emerging threats, advice on good security practices, analysis, explanation of technical news items, and brief, accurate, non-biased synopsis of security-focussed technology trends, S?nnet Beskerming commentary is many things.

Whether you call it a blog, online journalism, or commentary on events, this is where you can find and search all relevant articles published by S?nnet Beskerming.

All articles will eventually be made available free of charge, however some content is initially only available to paying subscribers.

Available entries
Microsoft 'Surprised' by 0.1% Infection Rate
Posted in: Information Security
Microsoft have been collecting information from their Malicious Software Removal Tool (MSRT) and their Windows Defender initiative and a recent statistic has 'surprised' them. After adding support for some malware that had been circulating since the middle of last year (a six month delay in recognit....
Posted: 10 April 2006 12:00

Sadmin Revisited - It's OK, the NSA Should Have a Copy
Posted in: Information Security
Following on from speculation in the 'Exploits Ahoy!' post, timely reporting on the discovery of a cross-platform Proof of Concept (PoC) virus has rattled a few cages amongst the security community. In its current form, the PoC demonstrates that Linux ELF binaries and Windows .exe files can be poten....
Posted: 9 April 2006 12:00

Exploits Ahoy!
Posted in: Information Security
Long-suffering Internet browser, Internet Explorer, has had another vulnerability disclosed. Initially announced for Internet Explorer 6.x and 7 Beta, similar vulnerabilities are also said to affect Firefox and Opera browsers. While a successful exploitation of the Opera vulnerability can lead to ar....
Posted: 8 April 2006 12:00

Fuzzy Wuzzy Was a Bear
Posted in: Information Security
What is Fuzzing, and why do I need to know?

Fuzzing is the latest vulnerability discovery method to attract widespread attention from researchers and hackers alike. It is essentially the process of forcing an application or software function to accept input that may not be valid, in order to disc....
Posted: 8 April 2006 12:00

This Government's Security Brought to you by Microsoft
Posted in: Information Security
Who don't you want to get in, today?

The Australian IT section has reported on the imminent announcement by the Australian Attorney General's Department that they have extended a 2003 agreement with Microsoft (the shared source agreement) to cover information security. The extended agreement clai....
Posted: 5 April 2006 12:00

Posts from December, 2017.