CERIAS Hotlist
Page Content
- 23rd National Information Systems Security Conference
Home page for the conference with links to old presentations, calls for papers, programs, etc.
http://csrc.nist.gov/nissc/ - Added Nov 03, 2000
- CERIAS: Center for Education and Research in Information Assurance and Security
The worlds foremost university center for multidisciplinary
research and education in areas of information security and information assurance.
http://www.cerias.purdue.edu/ - Added Dec 10, 1999
- An Analysis Of Security Incidents On The Internet
This research analyzed trends in Internet security through an investigation of 4,299 security-related
incidents on the Internet reported to the CERT
http://www.cert.org/research/JHThesis/Start.html - Added Dec 10, 1999
- An Introduction to Security Risk Analysis & Risk Assessment
Introduction to the theory behind most recognized risk assessment and risk analysis methodologies. Illustrated using the leading COBRA approach.
http://www.securitypolicy.co.uk/riskanalysis/ - Added Jun 15, 2000
- AntiOnline
Hackers know the weaknesses in your system, shouldn't you?
http://www.antionline.com/ - Added Nov 06, 2000
- Attrition
Get security and cryptography news here. Great computer attack analysis and some great graphs to stick in presentations for the suits.
http://www.attrition.org/ - Added Oct 24, 2000
- Awareness and Training Information
The Multi-State Information Sharing and Analysis Center provides awarenss and training information.
http://www.cscic.state.ny.us/lib/awareness/ - Added Jul 19, 2006
- Awareness to SMBs
The National Cyber Security Partnership provides awareness to SMBs.
http://www.cyberpartnership.org/init-aware.html - Added Jul 19, 2006
- Backbone Security.com
Backbone Security was created to help clients avoid potential losses from Internet security vulnerabilities, teach them more about information assurance and keep them safe from cyber threats.
http://www.backbonesecurity.com - Added Jun 20, 2001
- Best Security Tips
Best Security Tips offers daily news, information, advices, books and tips that helps regular computer users to protect themselves from spyware,adware, viruses, trojans, web vulnerabilities, hackers and other threats.
http://www.bestsecuritytips.com/ - Added Dec 03, 2006
- Beyond Security's SecuriTeam.com
SecuriTeam is a group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.
Having experience as Security Specialists, Programmers and System Administrators we appreciate your need for a "Security
http://www.securiteam.com/ - Added Apr 03, 2001
- BS7799 and ISO 17799 Open Guide
A public collaberation to document and support the BS7799 and ISO 17799 information security standards.
http://iso-17799.safemode.org - Added Feb 19, 2005
- Captus Networks
Integrated intrusion prevention and traffic shaping technology to stop Dos/DDoS attacks and manage bandwidth usage. Free vulnerability assessment toolkit and whitepapers available.
http://www.captusnetworks.com - Added Jul 24, 2003
- Center for Cryptography, Computer, and Network Security
The center's purpose is the andvancement of knowledge in the areas of cryptography, computer security, network security and
related areas from a theoretical as well as a practical viewpoint.
http://www.cs.uwm.edu/~cccns/ - Added Dec 10, 1999
- CERT Conference
The 4th annual CERT Conference, Computer Security and Information Assurance conference in Omaha, NE, August 6-9, 2002 offers an excellent opportunity to meet other security professionals and stay current on information security issues.
http://www.certconf.org - Added Apr 11, 2002
- Common Sense Guide to Cybersecurity
A SMB "Common sense Guide" to cybersecurity, available from the U.S. chamber of Commerce.
http://www.uschamber.com/publications/reports/0409_hs_cybers... - Added Jul 19, 2006
- Computer & Network Security (University of Florida)
Graduate course in Computer
Network Security - includes
online notes, links.
http://www.cise.ufl.edu/~nemo/security/ - Added May 19, 2000
- Computer and Network Security, University of Tennessee
Information on course CS594 at the University of Tennessee.
http://www.cs.utk.edu/~dunigan/cs594-cns/ - Added Dec 10, 1999
- Computer Forensic Exams
A computer forensics vendor independent portal for computer forensic examiners. It has computer forensic news, data recovery techniques, file system information, computer forensic job listing, an ISP database and much more.
http://www.forensicexams.org - Added Oct 17, 2006
- Computer Security - Tutorials - Online Metric Conversion
Computer Security - guides about firewall, antivirus, spam, windows xp,email scam and more
Tutorials-free : sql,symbian
Online Metric Conversion :calculator,tables,dictionary
http://www.jaec.info - Added Sep 01, 2006
- Computers, Security, and Ethics Course
Explains how two professors (Keith Miller from UIS and Marsha Woodbury from UIUC) co-taught a course
called Computers, Security, and Ethics at the University of Illinois at Springfield and the University of Illinois at
Urbana-Champaign during the
http://www.cpsr.org/~marsha-w/twocampus.html - Added Dec 10, 1999
- Crewl Underground Madness (cum) - Network Security & Hacking
Belgian hacking group specialized in network (in)security and phreaking - projects, downloads, links, etc.
http://www.blackhat.be/ - Added Jan 12, 2001
- Cryptography and Secure Communications, Purdue University
Resources and information on course EE627, Introduction to Cryptography and Secure Communication, offered at Purdue University.
http://dynamo.ecn.purdue.edu/~ace/courses/ee627/ee627.html - Added Dec 10, 1999
- Cryptography and Security Courses
List of crypto and security courses all over the world
http://avirubin.com/courses.html - Added Dec 10, 1999
- Cryptography, University of Illinois
Professor's notes from a past class taught on cryptography at the University of Illinois.
http://www.staff.uiuc.edu/~c-blair/crn.html - Added Dec 10, 1999
- Cryptology in Computing, University of New Mexico
Course information on course Computer Science 431(Cryptology in Computing) offered at the University of New Mexico.
http://www.swcp.com/~mccurley/course/ - Added Dec 10, 1999
- Cryptology, Odense University (Denmark)
Information on a course in cryptology taught at Odense University in Denmark.
http://www.imada.sdu.dk/~joan/crypt/ - Added Dec 10, 1999
- Customer Data Security Toolkit
The Council of Better Business Bureaus (CBBB) makes their customer data security toolkit available for free.
http://BBB.org/securityandprivacy - Added Jul 19, 2006
- Data Security and Cryptography, Oregon State University
Resources and information for course ECE 575 (Data Security and Cryptography) offered at Oregon State University
http://security.ece.orst.edu/koc/ece575/ - Added Dec 10, 1999
- Directory of Information Security White Papers
Organized and Categorized directory of InfoSec White Papers, no registration or account creation needed.
http://www.securestandard.com/ - Added Dec 31, 2003
- Do Security Holes Demand Full Disclosure?
Weld Pond's response to Marcus Ranum's keynote on full disclosure at the Black Hat Briefings.
http://cma.zdnet.com/texis/techinfobase/techinfobase/+kmseV6... - Added Sep 25, 2000
- Duke University Department of Computer Science
Duke's Department of Computer Science home page.
http://www.cs.duke.edu/ - Added Dec 10, 1999
- e4gle security development
e4gle concentrates on ELF format, Linux Kernel Hacking, Linux dynamic chain technology, Linux LKM Technology, Linux virus, and stack overflow, format string, heap overflow etc. All attack technology of insecure programming.
http://e4gle.org - Added Feb 04, 2002
- Elementary Security for your Linux Box
The real intent of this two-part series is to help you improve
the security of your system and to get you to think securely. One without the other is unlikely to
succeed.
http://www.itworld.com/Comp/2384/LinuxWorld/ - Added Oct 05, 2000
- Enterprise Security Management Systems
4FrontSecurity provides details on the 4FrontSecurity Enterprise Information Security Management System (IMS) and other solutions.
http://www.4frontsecurity.com - Added Jan 14, 2003
- FalseSecurity.net - Information and discussion of Network Security issues.
Articles and discussion forum to provide information and practical strategies on network or PC firewall security; virus prevention, detection and removal; OS and product vulnerability alerts and tactics; and convenient links to other sites that offer related and useful information.
http://www.falsesecurity.net - Added Sep 08, 2003
- Final Report NSF-LAMP Project
A report on identifying where technology logging and monitoring for increased security end and violations of personal privacy and student records begin.
http://www.aacrao.org/publications/catalog/NSF-LAMP.pdf - Added Jan 14, 2002
- Firewalls for Open Networks
Powerpoint presentation detailing the University of Washington's firewall implementation.
http://www.stonesoup.org/Meetings/0205/security.pres/gray.ht... - Added Jan 10, 2003
- Firewalls: Friend or Foe?
Network firewalls are important security tools, but they have significant disadvantages, and their effectiveness is often overstated. This is especially true of enterprise border firewalls, which attempt to create a moat around an entire organization. Border firewall capability is essential for dealing with cyberattack emergencies, but used routinely, it tends to be autocratic and inflexible, thereby encouraging various kinds of subversion, and it can encourage sloppy security practices within the border.
http://staff.washington.edu/gray/papers/fff-final.htm - Added Jan 10, 2003
- Georgi Guninski Security Research
This site is dedicated to security research on various topics.
I am independent security consultant. The works on this site were developed by me for free in my free time. I am Bulgarian. I am running a security mailing list
http://www.guninski.com/ - Added Apr 05, 2001
- Global Incident Analysis Center
Roadmap to Defeating DoS Attacks
http://www.sans.org/ddos_roadmap.htm - Added Sep 28, 2000
- How To Eliminate The Ten Most Critical
Information on how to protect yourself from the most common security threats.
http://www.sans.org/topten.htm - Added Sep 28, 2000
- How to Install Solaris and Have a Good Host Security
This is a short how to, dedicated to people having to deal with host security under Solaris 2.6, 2. 7 and Solaris 8.
http://www.yassp.org/ - Added Sep 28, 2000
- Hunting the Wily Hacker
A PDF presentation by the FBI at SANS DC2000.
http://www.sans.org/dc2000/FBI-%20Wily%20Hacker.pdf - Added Sep 28, 2000
- Information Assurance Technology Analysis Center (IATAC)
Information Assurance Technology Analysis Center (IATAC)is a Department of Defense (DoD) sponsored service available to all government and industrial base users to provide studies, analyses, data gathering and other R&D activities to meet research, acquisition, test, demonstration, operation, and logistics requirements related to IA, DIO, and IW technologies.
http://iac.dtic.mil/iatac/ - Added Aug 25, 2004
- Information security and fraud DVDs
The U.S. Postal Service offers seven DVDs free for the asking about information security and fraud. They are primarily targeted to consumers but they have information useful ro SMBs, and would also make a great addition to any organization\'s awareness program.
http://shop.usps.com - Added Jul 19, 2006
- Information Security Writers
Papers submitted by security professionals are published on the site and archived for readers. Monthly book prizes are awarded to writers. Categories include cryptography, email security, exploitation, firewalls, forensics, honeypots, IDS, malware & wireless security.
http://www.infosecwriters.com - Added Dec 05, 2003
- Information Systems Security Association (ISSA)
The Information Systems Security Association (ISSA) is a not-for-profit international organization of information security professionals and practitioners. It provides education forums, publications and peer interaction opportunities.
http://www.issa.org/ - Added Nov 15, 2000
- Information Systems Security Laboratory, ECE Iowa State University (ISSL)
A site providing information on courses offered in Information Systems Security at Iowa State University.
http://www.issl.org/ - Added Dec 10, 1999
- Information Warfare and Information Security on the Web
This metapage is a comprehensive guide to information warfare resources on the Web, as well as a directory of points of entry to related resources. If you know of any resources that are not listed here, please let us know about them.
http://www.fas.org/irp/wwwinfo.html - Added Apr 10, 2001
- InfoSec and InfoWar Portal
Information warfare, security, cybercrime information
http://www.infowar.com/ - Added Apr 10, 2001
- InfoSysSec Secuirty News
Latest Security Related Headlines from the Internet
http://www.infosyssec.com/infosyssec/infosecnews.html - Added Nov 06, 2000
- Insecure - Top 75 Security Tools
Expanded list of top 75 security tools.
http://www.insecure.org/tools.html - Added May 25, 2006
- International Biometric Group
International Biometric Group is the biometric industrys leading integration and consulting firm. Good information under the Network Security section.
http://www.biometricgroup.com/ - Added Jan 08, 2001
- International Centre for Security Analysis (ICSA)
ICSA is the consultancy research arm of the Department of War Studies and part of the War Studies Group at
Kings College London.
http://www.icsa.ac.uk/ - Added Mar 08, 2000
- Internet Security Information & Tools
Site dedicated to free Information Security information, Tools, FAQ\'s, Downloads, Forum, Web Links, online vulnerability and penetration scans, Security Papers, and the latest news and alerts. We also provide a free \"Ask the Expert\" service where questions can be submitted for review and response by a Security Professional.
http://www.inetsecurity.info - Added Oct 04, 2003
- Interview with Phil Zimmermann
The following is a full transcript of a radio show broadcast on radio station WALE. The views expressed are solely those of Russell
D. Hoffman and Phil Zimmermann (creator of PGP) and do not necessarily reflect anyone else's point of view.
http://www.animatedsoftware.com/hightech/philspgp.htm - Added Dec 10, 1999
- Introduction to Security Risk Analysis & Security Risk Assessment
Introduction to the theory behind most recognized risk assessment and security risk analysis methodologies.
http://www.security-risk-analysis.com - Added Mar 21, 2001
- invulnerableit.com
An open informational community for information technology enthusiasts to access resources and interact with one another about the most crucial aspect of the field today: security.
http://www.invulnerableit.com - Added Oct 05, 2005
- ISO 17799 & ISO 27001 Security News
Established portal and resource directory dedicated to the ISO 17799 and ISO 27001 security standards.
http://www.computersecuritynow.com - Added Jun 24, 2006
- ISO IEC 17799 Information Security in Plain English
ISO IEC 17799 2005 is an information security management standard. Use our resource to understand ISO IEC 17799 2005, to establish an information security management system (ISMS) for your organization, and to audit its performance.
http://www.praxiom.com/iso-home.htm - Added Mar 04, 2007
- ISO IEC 27001 Information Security in Plain English
ISO IEC 27001 is an information security management standard. Use our plain English resource to help you establish and certify your information security management system (ISMS).
http://www.praxiom.com/27001.htm - Added Apr 04, 2007
- Kerberos: The Network Authentication Protocol
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Te
http://web.mit.edu/kerberos/www/ - Added Mar 30, 2001
- Kerberos: An Authentication Service for Computer Networks
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to
falsely claim another\'s identity. Kerberos is the most commonly used example of this type of authentication technolog
http://www.isi.edu/gost/publications/kerberos-neuman-tso.htm... - Added Dec 10, 1999
- Linux Security.com
The Linux Communitys Center for Security
http://www.linuxsecurity.com/ - Added Oct 24, 2000
- Markus Jansson's Privacy And Security Page
These pages are about internet security & privacy issues which concern us all. Here you will find information, resources and links related to computer security.
http://www.markusjansson.net - Added Mar 31, 2002
- Microsoft Lacks Motivation to Change Security
Every week, some headline seems to call attention to a
security vulnerability in a Microsoft product. Because
Microsoft products are so widely used, they will be the targets of more attacks, so more vulnerabilities will come to light.
http://news.com.com/2100-1023-244498.html?legacy=cnet - Added Sep 25, 2000
- Mistakes People Make the Lead to Security Breaches
Mistakes made by the common user that lead to security breaches.
http://www.sans.org/mistakes.htm - Added Sep 28, 2000
- Mountain Wave, Inc.
Computer Security News Daily.
http://www.mountainwave.com/ - Added Nov 06, 2000
- National Information Assurance Partnership (NIAP)
An NSA and NIST initiative designed to meet the security testing needs for both information technology producers and users.
http://niap.nist.gov/ - Added Nov 02, 2000
- NDC Logical Firewall
Whereas there is no substitute for secure and properly configured hosts, there are times when it is desirable to get additional protection by passing traffic to and from some hosts through an additional protective filtering layer (usually called a firewall).
The traditional (and most secure) firewall is physically inserted between the hosts to be protected and the rest of the world, however this physical break in the network may be impractical for various reasons. The logical firewall (LFW) may be an attractive alternative because it can physically exist anywhere on the subnet and protect hosts anywhere on the subnet without rewiring.
http://staff.washington.edu/corey/fw/ - Added Jan 10, 2003
- Netscape Security
Netscapes Security page with links to current articles pertaining to security
http://wp.netscape.com/security/index.html - Added Dec 10, 1999
- Network Security Credo
Computer system security has many dimensions, and they overlap. While this document is focused primarily on network-level security issues, it is impossible to avoid some discussion of other parts of the picture, most notably, application and OS security. Network security is a subset of general computer system security, but a rather large subset, since virtually all access to contemporary hosts is via a network connection.
http://staff.washington.edu/gray/papers/credo.html - Added Jan 10, 2003
- Network Security, Georgia Tech
Course Information on CS8113e (Network Security) offered at Georgia Tech.
http://www.cc.gatech.edu/classes/cs8113e_96_winter/ - Added Dec 10, 1999
- New Denial-of-Service Attack Tool uses Relay Chat
Security experts this week say an even more
dangerous tool than the past DoS tools, called Trinity, has just been discovered.
http://www.nwfusion.com/news/2000/0906ddos.html - Added Sep 26, 2000
- NewOrder News
The resource for people to help avoid being hacked, security and exploiting related files and links.
http://neworder.box.sk/news.php3?maxnumber=99 - Added Nov 06, 2000
- NIS and Security
The following is a brief compendium of what we at Auburn Univeristy College of Engineering use to secure our NIS networks.
http://www.eng.auburn.edu/users/doug/nis.html - Added Dec 10, 1999
- NIST Computer Security Publications
These publications present the results of NIST studies, investigations, and research on information technology security issues.
http://csrc.ncsl.nist.gov/publications/ - Added Mar 28, 2001
- NoticeBored - information security awareness service
NoticeBored delivers creative multi-media materials for use in information security awareness campaigns. New materials are provided every month for end users, general managers and information security managers. NoticeBored campaigns are guaranteed effective.
http://www.noticebored.com/ - Added Jun 02, 2003
- NoticeBored security awareness service
Delivers fresh awareness materials covering a different information security topic each month. Free newsletter and white papers.
http://www.noticebored.com/?ref=CERIAS - Added Mar 11, 2004
- Now is the Time for Two-Factor Security
Solutions exist for tamper-proof digital credentials, but
they're not compatible with each other. The problem, David
Berlind notes, is a lack of standards.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Oct 30, 2001
- Open Source Security Standards
A suite of free to use open information security standards published by Little cat Z Ltd under a liberal open source license. Participation is invited from all interested parties and it is our aim to deliver all the professional security standards anyone could want, free of charge with open document source.
http://www.littlecatZ.com/standards/ - Added May 02, 2003
- People for Internet Responsibility
A global, grassroots, ad hoc network of individuals who are concerned about the current and future operations, development, management, and regulation of the Internet in responsible manners. The goal of PFIR is to help provide a resource for individu
http://www.pfir.org/ - Added Nov 07, 2000
- phreak.se
Enormous telecom- & phreaking related archives.
Information, software, images. Never-before seen
material from the insides of telcos worldwide.
http://www.phreak.se - Added Oct 12, 2003
- Presidential Briefing, February 15
Notes from the White House Meeting on Internet Security with Members of the Internet Community, President Clinton
and Members of the Cabinet
http://www.sans.org/pres.htm - Added Sep 28, 2000
- QuickLinks--Computer Crime
Links to current articles and news stories about computer crime.
http://www.qlinks.net/quicklinks/comcrime.htm - Added Nov 06, 2000
- RC6, from Dr. Ron Rivest
This site contains links to numerous publications by Ronald L. Rivest about security, cryptography, etc.
http://theory.lcs.mit.edu/~rivest/publications.html - Added Dec 10, 1999
- Royal Holloway College
This page gives a brief overview of the MSc in Information Security at Royal Holloway. The course is taught by the Information
Security Group. It is intended as a foundation for a professional career as well as for postgraduate research in this area
http://www.isg.rhul.ac.uk/msc/msc_home.shtml - Added Dec 10, 1999
- Sans Tools
Sans Tools
http://www.sans.org/tools.php - Added Feb 05, 2003
- Search for Security Sites
The only search engine dedicated to security sites.
http://Astalavista.box.sk/ - Added Oct 24, 2000
- Secrets and Lies: Digital Security in a Networked World
Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive.
http://www.counterpane.com/sandl.html - Added Sep 25, 2000
- Secure Internet Programming
A web page put together by Edward Felton and Andrew Appel at Princeton University about problems they are or have been studying in computer security.
http://www.cs.princeton.edu/sip/ - Added Dec 10, 1999
- Secure Personal Information
The Office of the Privacy Commissioner of Canada makes many types of information available to help organizations secure the personal information the handle. While they are focused primarily on Personal Information Protection and Electronic Documents Act (PIPEDA) compliance, most of the activities are good to apply in any busines.
http://www.privcom.gc.ca/ekit/ekit_e.asp - Added Jul 19, 2006
- Securing your Linux Box
This article will give a brief introduction to securing your Linux box and making your network
environment a safer place for both your data and the people who use use it.
http://www.linuxgazette.com/issue34/vertes.html - Added Oct 05, 2000
- Security Activities @ San Diego Supercomputer Center & NPACI
Happenings with security at SDSC and NPACI.
http://security.sdsc.edu/activities/ - Added Jan 11, 2001
- Security Courses, University of Wisconsin
A link to three different security courses taught by Yvo G. Desmedt at the University of Wisconsin. These courses are Data Security, Internet and Network Security/Insecurity, and Advanced Cryptography.
http://www.cs.uwm.edu/faculty/desmedt/teaching.html - Added Dec 10, 1999
- Security Forums
Growing community and portal covering everything from computer & internet security through to hardware and operating systems
http://www.security-forums.com - Added Jun 01, 2003
- SecurityStats.Com
Computer Security Statistics, News, Stories, and Related Links
http://www.securitystats.com/ - Added Jun 25, 2000
- Smart Card and Biometric security solutions
We carry smart card and biometric security development kits to help you secure your PC and your applications. We also carry a smart card logon kit to secure your PC.
http://www.Didya.com - Added Mar 11, 2003
- SPIDER
We are not one group but a set of three groups, viz., {VLSI Testing, Distributed Applications, Computer Security}. The elements of this set are arranged in the decreasing order of their ages. Each of these groups has been working more or less indepen
http://www.cse.buffalo.edu/~shambhu/research.html - Added Nov 26, 2001
- Study: Insiders Pose Main Hacking Threat
While chief executives worry about external foes hacking into corporate networks, their real concerns should be the Trojan Horses--disgruntled employees with the inside knowledge to easily steal sensitive secrets--according to a recent study released
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Apr 03, 2001
- SuraSoft.com Security
SuraSoft.com has articles on security subjects including firewalls, packet sniffing, encrption and online privacy. SuraSoft also hosts a number of security forums for visitor discussions
http://www.surasoft.com - Added Mar 03, 2002
- The Common Criteria for Information Technology Security (CC)
Here you will find information about the Common Criteria for IT Security Evaluation (CC), plus various CC-related documents.
http://csrc.ncsl.nist.gov/cc/ - Added Mar 28, 2001
- The Info Security News Service
This on-line news service is backed by SC Magazine. The news service gathers information globally through a network of correspondents and over 200 news services. Key links associated with the news direct you to further sources of information releva
http://www.infosecnews.com/sgold/main.htm - Added Nov 06, 2000
- The Information Security Domain of Phil Cracknell
A great site with a lot of security information, links, libraries, help, etc.
http://www.cracknell.co.uk/ - Added Mar 20, 2001
- The Internet Developer / Technology Group
The Internet Developer / Technology Group promotes discussion of relevant technologies and issues affecting the usefulness of the internet such as:
appropriate personal privacy enhancements,
information location technologies,
developing devices
http://www.inetdevgrp.org/ - Added Nov 02, 2000
- The Kerberos Network Authentication Service
http://www.isi.edu/gost/info/Kerberos/ - Added Dec 10, 1999
- The Last Stage of Delirium - Research Group
The official website of the Last Stage of Delirium Research Group
http://lsd-pl.net/ - Added Apr 22, 2003
- The National Cyber Security Alliance
The National Cyber Security Alliance helps SMBs learn about information security, data recovery and cyber crime reporting.
http://www.staysafeonline.org/basics/small_business.html - Added Jul 19, 2006
- The Privacy Foundation
Lists bugs, advisories, top privacy stories, etc.
http://www.privacyfoundation.org/ - Added Sep 26, 2000
- The Secure Shell (SSH) FAQ
The Secure Shell (SSH) Frequently Asked Questions page.
http://www.employees.org/~satch/ssh/faq/ - Added Apr 12, 2001
- The Software Risk Management Conference
Learn how to guarantee your success by attending ISACC 2000.
http://www.isacc.com/ - Added Sep 25, 2000
- TRUSTe Accused of violating its own Privacy Policy
Security consulting firm Interhack Corp. has accused
Truste of violating
its own privacy policy by tracking the personal information of visitors
to its Web site and shar
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49059... - Added Sep 26, 2000
- U.S. Department of Homeland Security Important Information
The U.S. Department of Homeland Security has information available on their Ready Business site that SMBs will find useful.
http://www.ready.gov/business/st3-improvecyber.html - Added Jul 19, 2006
- Understanding cyber threats
The FTC, Department of Commerce, Department of Homeland Security, U.S.P.S. and the Securities Exchange Commision created a Web site providing a large amount of information security facts that can help SMBs understand cyber threats.
http://ongaurdonline.gov/index.html - Added Jul 19, 2006
- Word documents susceptible to Word Bug
Microsoft is weathering complaints that documents created with Microsoft Word and
some of its other popular desktop applications can be embedded with electronic
surveillance tags allowing document authors to track their use.
http://news.com.com/2100-1023-245160.html?legacy=cnet - Added Sep 26, 2000
- Xatrix
Xatrix Security offers some whitepapers, a wide range of exploits and new security related programs. It is updated daily.
http://www.xatrix.org/ - Added Dec 14, 2000
- XP Vulnerable to DoS Attack
Windows XP's new feature could spell doom for Internet
businesses. But Wayne Rash tells you how to work around the
security holes.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Oct 23, 2001