1.
Frequency X Blog
At one point I use the example of CAPTCHA’s and how they are commonly deployed ... But I also point out that in many cases the CAPTCHA’s have evolved to a ...
2.
Frequency X Blog
Since VeriSign and 3Com launched their commercial vulnerability purchasing programs (i.e. VeriSign’s iDefense Vulnerability Contributor Program and 3Com’s ...
3.
Frequency X Blog
Anti-virus Vendors Succumbing to SQL Injection. Posted by Gunter Ollmann on February 12, ... It’s been an interesting week for anti-virus software vendors. ...
4.
Frequency X Blog
Internet Security Systems - AlertCon(TM) ... The nature of the security threats facing RFID technologies shouldn’t be underestimated. ... the tags and how it will be interpreted by the software that interfaces with backend systems. ...
5.
Frequency X Blog
Microsoft publishes great technical information. Posted by Tom Cross on October 23, 2008 at 6:01 PM EDT. Recently we've noticed that Microsoft has been ...
6.
Frequency X Blog
For this blog entry I’ve chosen one that affects most of us – Online .... are all affected equally if they are using Acrobat Reader to view PDF files. ...
7.
Frequency X Blog
For this blog entry I’ve chosen one that affects most of us – Online .... are all affected equally if they are using Acrobat Reader to view PDF files. ...
8.
Frequency X Blog
If contacting the email provider and answering the “forgotten password” .... the views of IBM Internet Security Systems, its management or employees. ...
9.
Frequency X Blog
RSA 2009 - Security Ergonomics & back-office anti-fraud protection techniques ... For this blog entry I’ve chosen one that affects most of us – Online ...
10.
Frequency X Blog
For this blog entry I’ve chosen one that affects most of us – Online banking (something that’ll only skim over with the RSA Conference talk – so there’ll ...