Please turn on your JavaScript for this page to function normally.
Detecting and Understanding Rootkits

Well, well, well. You have installed the latest Linux distribution and stopped all unnecessary services. You also set-up a set of Netfilter rules that would make the Pentagon …

Internet Virus Advisory: Variations of Worm/Lovsan Discovered

Virus writers developing new variations of aggressive Internet worm MEDINA, Ohio, Aug. 13 /PRNewswire-FirstCall/ — Central Command, a leading provider of PC anti-virus …

Zix Corporation is Selected by Blue Plans in New York for Secure e-Messaging and Protection Services

Two Blues Are Added to ZixCorp’s Growing Healthcare Client Roster in New York DALLAS–(BUSINESS WIRE)–Aug. 13, 2003–Zix Corporation (ZixCorp(TM)), …

Blaster Worm Impact May Snowball as Number of Reports Increases, Warns Sophos

Sophos’s technical support department is seeing an hour-on-hour increase in the number of calls from users concerned about the prolific Blaster worm, first seen late in …

Prevention: The Best Weapon Against the Blaster Worm

– A few basic security measures are enough to prevent attacks from this malicious code – Panda Software’s Virus Lab has detected the appearance of another …

Websense Enterprise Client Application Manager Blocks MSBlaster Worm

Websense software provides vital early defense during time-critical window of exposure CHERTSEY, 13 August 2003-Websense Inc. (NASDAQ: WBSN), the world’s leading …

Fortress Technologies & AirDefense Launch Business Partnership for Targeted Government and Enterprise Customers

Leaders in Wireless LAN Security Working Together & Integrating Technologies ATLANTA – August 12, 2003 – Two of the most trusted names in wireless LAN …

ZNQ3 Signs Reseller Agreement with TransCOR Information Technologies to Provide Communications Security Solution for Mobile Environments

New Product Greatly Simplifies Security Management for Panasonic Toughbooks Manchester, New Hampshire – August 7, 2003 – ZNQ3â„?, Inc., a developer of remote …

Advanced Encryption Standard by Example

The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL) encryption algorithm. The purpose of this paper is to …

IntelliSpace Adopts Captus Intrusion Prevention System to Guard Against Network Attacks and Optimize Bandwidth Usage

Customer Cites Automatic Enforcement Capabilities as Deciding Factor woodland, Calif., August 13, 2003 – Captus Networks Corp., provider of the Captus(tm) IPS 4000 …

Ubizen’s Security Intelligence Lab Reports Worm Exploiting Microsoft’s DCOM RPC Vulnerability

— W32/Lovsan.worm hits the Internet — Ubizen, the principal provider of Managed Security Solutions (MSS) for global businesses, warns against a newly discovered …

Diversinet Appoints Cyber Security Experts Richard Clarke and Roger Cressey to its Advisory Board

TORONTO, Canada, August 12, 2003 – Diversinet Corp. (OTCBB: DVNTF), a leading provider of secure mobile solutions, today announced the appointment of Richard Clarke and …

Don't miss

Cybersecurity news