Site Network: Beskerming.com | Skiifwrald.com | Jongsma & Jongsma

Innovation in Information Security

Coverage of important Information Security and Information Technology news and events from the research team at S?nnet Beskerming.

Username: | Password: Contact us to request an account

Commentary & Insight From S?nnet Beskerming

Covering news on emerging threats, advice on good security practices, analysis, explanation of technical news items, and brief, accurate, non-biased synopsis of security-focussed technology trends, S?nnet Beskerming commentary is many things.

Whether you call it a blog, online journalism, or commentary on events, this is where you can find and search all relevant articles published by S?nnet Beskerming.

All articles will eventually be made available free of charge, however some content is initially only available to paying subscribers.

Available entries
A Week for Security
Posted in: Information Security
Purdue University in the United States has reported its third theft of electronic information this calendar year. In this case, 11,360 past and present employees may have had their records accessed. Although smaller than a number of other security breaches reported this year, it is the latest in a d....
Posted: 30 May 2005 12:00

German Spam
Posted in: Information Security
The recent spate of German Spam, and the announcement by the Australian Democrats about an anti-spyware bill are the main topics of discussion for this week's column. If readers have any requests or suggestions for further topics or areas of discussion, please send an email to info@beskerming.com.Posted: 23 May 2005 12:00

Cisco Theft 12 Months on
Posted in: Information Security
Twelve months ago Cisco was the victim of a network penetration, which resulted in their IOS source code being compromised. The IOS is the operating system used by Cisco networking hardware, a large number of which effectively form the backbone of the Internet. At the time, there was little news abo....
Posted: 16 May 2005 12:00

Beware of Clicky, and Where is Google?
Posted in: Information Security
Instant Messaging (IM) applications, such as MSN Messenger, ICQ, AIM and iChat have grown in popularity in recent years as they allow near realtime text communication between two or more people across the internet (or local networks). Some applications even include voice chat, video chat, games, fil....
Posted: 9 May 2005 12:00

My AntiVirus Killed my PC
Posted in: Information Security
In rare circumstances auto-updating software, such as Anti-virus applications, can act as security weaknesses rather than strengths. Recently such a case occurred when the Trend Micro Anti-Virus application had a buggy identification file released. The culprit, version 594 of their virus definitions....
Posted: 2 May 2005 12:00

Posts from March, 2024.