Help Net Security
TCP/IP Bible
TCP/IP is the protocol suite that runs almost every network environment today. Consequently there are tons of books about TCP/IP - some deal with network implementation …
Weekly Virus Report – Fizzer Worm and Lovgate Variants
This week’s virus report looks at Trifor (Trj/Trifor), the dangerous Fizzer worm (W32/Fizzer), and the I, J, K, L and M variants of the Lovgate worm. Trifor is a Trojan …
Flaw in Fizzer’s Code Provides Vital Hint of Infection
The Fizzer worm (W32/Fizzer-A), which has this week spread via email, file-sharing networks and internet relay chat, has been found by Sophos researchers to contain a bug …
Macrovision Launches SafeDisc Copy-Protection for Mac OS X
Available to Mac ISVs Worldwide SANTA CLARA, Calif. — May 15, 2002 — Macrovision Corporation (Nasdaq: MVSN), the world’s leading provider of digital rights management …
BOScom Launches First Fully Secure IP Telephony Gateways with Dynamic IP to PSTN Switching
Leicester, UK – 15th May, 2003 — IP Telephony specialists BOScom, of Leicester, has announced its new BOS??NOVA Claro family of IP Telephony products — the …
Handbook for Computer Security Incident Response Teams (CSIRTs)
The document is aimed at aiding the planning, creation and development of CSIRTs: teams trained specifically to deal with IT security incidents. One of the principal tasks of …
Meetinghouse and Intersil Enter into Licensing Agreement for AEGIS Authentication API Supporting WPA and Cisco CCX Wireless LAN Security
Agreement for Embedded Security Technology Exclusive to Meetinghouse PORTSMOUTH, NH, May 14, 2003 – Meetinghouse, a leading developer of standards-based network …
Trustix Answers Small Business Needs With Launch of First Linux-based Small Office Server
The most comprehensive offering for small business addresses all server-based applications plus unparalleled security London, UK / 14th May 2003 -Trustix (www.trustix.com), …
The Second Coming Of the “Lovgate” Worm
Kaspersky Labs, an international data security software developer, reports the detection of the five new modifications of the “Lovgate” Internet worm, first …
Linux Security: Public Key and Symmetric Key Encryption
This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Public Key Encryption In order to use public key …
Panda Antivirus Titanium: Awarded “Recommended Product” from BIT Portugal
Panda Software’s leading home-user solution receives yet more international acclaim MADRID, May 12 2003 BIT Portugal, one of the country’s leading IT magazines, …
Fizzer E-mail Worm is Spreading at an Alarming Rate
F-Secure is raising the alert to the highest level as Fizzer becomes one of the most widespread viruses currently in circulation. Fizzer was first seen on Thursday, 8th of …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments