Search: Home Bugtraq Vulnerabilities Mailing Lists Jobs Tools Vista
Columnists (Page 1 of 46)   1 2 3 4 5 6 7 8 9 10 11  Next >
An Astonishing Collaboration
by Dan Kaminsky, 2008-07-09
On Tuesday, software developers and network-hardware providers released a patch for a significant flaw in the domain-name service (DNS) system. The researcher who found the bug, Dan Kaminsky, talks about the issue and the history of DNS problems in the column, reprinted with permission from his site.
http://www.securityfocus.com/columnists/477

Bad-Code Blues
by Don Parker, 2008-07-08
Despite advances in secure-coding practice, most developers continue to let serious security bugs slip into their programs. SecurityFocus contributor Don Parker argues that until customers hold their software providers responsible, bad code will keep coming.
http://www.securityfocus.com/columnists/476

Firing Up Browser Security
by Federico Biancuzzi, 2008-06-20
Mozilla released its latest browser, Firefox 3.0, this week. SecurityFocus contributor Federico Biancuzzi tracks down two key members of Mozilla's security team to learn more about the security features included in this major release.
http://www.securityfocus.com/columnists/475

Racing Against Reversers
by Federico Biancuzzi, 2008-06-05
Each time a new digital rights management (DRM) system is released, reverse engineers are not far behind in cracking it. SecurityFocus contributor Federico Biancuzzi interviews Nate Lawson, the co-designer of the Blu-ray content protection system, on the challenges of defending digital content.
http://www.securityfocus.com/columnists/474

Anti-Social Networking
by Mark Rasch, 2008-05-22
The strategy of U.S. prosecutors in the MySpace-hoax suicide case could leave the nation with an unpalatable precedent, says SecurityFocus columnist Mark Rasch.
http://www.securityfocus.com/columnists/473

Thinking Beyond the Ivory Towers
by Dave Aitel, 2008-05-15
A recent paper on automatically generating exploits from patches underscores the differences in the way academics and security researchers think, argues Dave Aitel, chief technology officer for security firm Immunity.
http://www.securityfocus.com/columnists/472

Click Crime
by Mark Rasch, 2008-05-09
Attempt to download a file and the FBI may come knocking at your door. SecurityFocus contributor Mark Rasch discusses the coming world of click crimes.
http://www.securityfocus.com/columnists/471

Just Who's Being Exploited?
by Jamie Reid, 2008-04-21
Vulnerability-buying programs have become a popular way of being paid for a previously unknown flaw. Yet, pricing models suggest researchers are being taken.
http://www.securityfocus.com/columnists/470

On the Border
by Mark Rasch, 2008-03-20
SecurityFocus contributor Mark Rasch ponders the age-old question of the privacy of personal information when making his way through airport security.
http://www.securityfocus.com/columnists/469

Catch Them If You Can
by Don Parker, 2008-03-12
To catch online attackers and data thieves, corporate management must spend the money to keep their security analysts at the top of their game, SecurityFocus contributor Don Parker argues.
http://www.securityfocus.com/columnists/468

Columnists (Page 1 of 46)   1 2 3 4 5 6 7 8 9 10 11  Next >







 

Privacy Statement
Copyright 2007, SecurityFocus