Please turn on your JavaScript for this page to function normally.
Who has the Ultimate Responsibility for Eliminating Modem Hijacking?

(PRWEB) January 28, 2005 — Modem hijacking occurs when a dialer program is installed on a computer, with or without the owner’s knowledge or consent, and proceeds …

Deny All Introduces Server Load Balancing to Web Applications

London, 28 January 2005 Deny All, an application security company, has today announced it is complementing its rWeb security and authentication solution by integrating Server …

Mass-Mailing Worm Suspect Arrested In Spain, Sophos Comments

The Spanish Civil Guard has announced that it has detained a 20-year-old man in Ejica, near Seville, in connection with creating and spreading the “Tasin” computer …

SteelEye Technology launches LifeKeeper Protected Program

Palo Alto, CA – 27th January, 2005 – SteelEye Technology, an innovator in data and application availability management for Linux and Windows, today announced the …

New Kerio ServerFirewall Defends Vulnerable Windows Servers against Security Threats

Kerio Technologies, Inc., provider of Internet messaging and firewall software for small to medium-sized (SMB) networks, has announced Kerio ServerFirewall, a powerful and …

New Research Uncovers Security and Audit Risks Exposed in Business Documents

London, 27th January 2005 – A new research report published today entitled The Risk of Sharing shows increasing risks and liabilities organisations face when dealing …

“AspectJ Cookbook”: Even Lazy Developers Can Write and Design Better Software

Farnham,UK–“I’m a lazy software engineer in the best possible way,” AspectJ expert Russ Miles admits shamelessly. “I hate doing something more …

FrontBridge Named Finalist for Best Enterprise Security Product By SIIA Codie Awards

27 January, 2005 – FrontBridge Technologies Inc. today announced that its suite of message security and management services has been named a finalist for the Best …

The Role Of Email Security In Meeting Regulatory Requirements

Corporate governance and regulation were one of the dominant themes of 2004 and look set to continue to be so throughout 2005. Corporate governance relates to how an …

If your computer insults you, it has been infected by the new Cisum.A worm

PandaLabs has detected the appearance of Cisum.A, a worm whose most distinguishing characteristic is that it insults the user by displaying the following message on screen …

Network Admission Management Solution Offered by Vernier Networks Reduces Intrusion Risks

MOUNTAIN VIEW, CA (PRWEB) January 26, 2005 — http://www.verniernetworks.com – At the recent CSI Conference, Vernier Networks® announced that it offers the only …

New Wave of Internet Domain Name Theft Identified – Experts Explain How to Prevent Someone from Trying to Steal a Domain Name From You

(PRWEB) January 26, 2005 — A new wave of internet domain name theft has been sweeping the world wide web. Recently, prominent internet service provider panix.com had …

Don't miss

Cybersecurity news