Please turn on your JavaScript for this page to function normally.
Security Risks In The Wireless Computing Environment

The wireless network as a computing paradigm has brought unprecedented access, flexibility and usability to the I.T. environment in a relatively short time. When one considers …

Pointsec joins Trusted Computing Group to Advance Open Standards for Security Technologies

Newmarket, UK, December 21, 2004 – Pointsec, the worldwide de facto standard for mobile device security, today announced it has joined the Trusted Computing Group (TCG), …

Scania on Road To Email Security Certainty: MessageLabs To Protect Leading Truck Maker Against Email Security Threats

London, 21 December 2004 – MessageLabs, the world’s leading provider of managed email security services to businesses, has been selected by Scania, one of the …

Virus Hall of Fame for 2004

The year 2004 has been an erratic year with respect to malicious code. There have been serious epidemics such as those perpetrated by Sasser or Mydoom, and we have witnessed a …

British Teen Sentenced For Computer Worm That Helped Spammers

A British teenager has been convicted for releasing the Randex computer worm, designed to turn innocent infected computers into compromised ‘zombies’ for …

CornerPost Releases Chaperon Internet Filtering for Microsoft ISA Server 2004

CornerPost Software, a leader in Internet filtering and content management since 1996, today introduced Chaperon Internet filtering for Microsoft Internet Security and …

First Justice Tapped as Major Distributor for Seventh Knight’s

Vicksburg, Mississippi (December 20, 2004) – First Justice, Inc., a contract services provider to corporate, industrial and commercial clients, today announced that it …

SSH Builds Upon The Evolution Of Its World Leading Secure Shell Technology In 2005

HELSINKI, FINLAND and WELLESLEY, Mass. Dec. 14, 2004 SSH Communications Security Corp. (HEX:SSH1V), a world-leading developer of managed security middleware and the original …

Why Your Data Is At Risk

Electronic data resides in two basic areas: In bulk in some form of repository, such as a database or collections of individual files (called data at rest) In small quantities …

Weekly Report on Viruses and Intruders – Zafi.D, Atak.H, Atak.I, Atak.J and Janx.A Worms and HideProc.B Trojan

At the beginning of this week, Zafi.D started spreading rapidly to a large number of computers hidden in email messages with variable characteristics, which passed themselves …

Your Anti-virus is Not the Answer to Your Total Internet Security

(PRWEB) December 17, 2004 — Do you think your anti-virus software is all that you require for protecting your system from cyber criminals? Is it all that you need to …

Version3, Inc. Announces Version3 Simple Sign-On 2.0 An Affordable Easy to Use Single Sign-on Solution

Version3, Inc., (www.ver3.com) developer of Version3 Simple Sign-On, today announced the December 2004 availability of Version3 Simple Sign-On v2.0 with a new, comprehensive …

Don't miss

Cybersecurity news