Stories by Scott Berinato

The booming hacking business

It's a good time to be a malicious hacker. That's because even though it's not a time of revolutionary new techniques in hacking for profit, business is booming for the established methods. Despite increased investment in information security defenses, the good guys continue to lag badly behind. According to one report by Sophos, which called the recent uptick in ­malware a "deluge," by April 2007, more than 250,000 websites were hosting malicious code and more than 8,000 were being added to that total every day.

Scott Berinato | 26 Jul | Read more

Here comes image spam

Image spam--e-mail solicitations that use graphical images of text--is not new. But its rising sophistication has made much of it invisible to spam filters so that it makes up one-third of all spam, according to Doug Bowers, director of antiabuse engineering at Symantec. E-mail traffic--83 percent of which was spam--rose in 2006, according to antispam company BorderWare, and researchers there expect image spam to grow.

Scott Berinato | 01 Mar | Read more

The chilling effect

Last February at Purdue University, a student taking "cs390s - Secure Computing" told his professor, Dr. Pascal Meunier, that a Web application he used for his physics class seemed to contain a serious vulnerability that made the app highly insecure. Such a discovery didn't surprise Meunier. "It's a secure computing class; naturally students want to discover vulnerabilities."

Scott Berinato | 01 Feb | Read more

Crash Test Ratings for Software Code

During the recent RSA security show a group of vendors, analysts and security professionals formed the Application Security Industry Consortium. The idea behind AppSic is simple: Create a way to tell software buyers something about the relative strength and weaknesses of the application they are evaluating.

Scott Berinato | 27 Apr | Read more

ROI Inside

Allen Rude, security manager at Intel, invested more than four years in an ROI study to justify the cost of digital video surveillance.

Scott Berinato | 16 Nov | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release