Help Net Security
Palyh Worm Disguised as Microsoft Email
Sophos, a global leader in anti-virus protection for businesses, has warned that a new email-aware worm is spreading, disguised as an email appearing to come from …
TCP/IP Bible
TCP/IP is the protocol suite that runs almost every network environment today. Consequently there are tons of books about TCP/IP - some deal with network implementation …
Weekly Virus Report – Fizzer Worm and Lovgate Variants
This week’s virus report looks at Trifor (Trj/Trifor), the dangerous Fizzer worm (W32/Fizzer), and the I, J, K, L and M variants of the Lovgate worm. Trifor is a Trojan …
Flaw in Fizzer’s Code Provides Vital Hint of Infection
The Fizzer worm (W32/Fizzer-A), which has this week spread via email, file-sharing networks and internet relay chat, has been found by Sophos researchers to contain a bug …
Macrovision Launches SafeDisc Copy-Protection for Mac OS X
Available to Mac ISVs Worldwide SANTA CLARA, Calif. — May 15, 2002 — Macrovision Corporation (Nasdaq: MVSN), the world’s leading provider of digital rights management …
BOScom Launches First Fully Secure IP Telephony Gateways with Dynamic IP to PSTN Switching
Leicester, UK – 15th May, 2003 — IP Telephony specialists BOScom, of Leicester, has announced its new BOS??NOVA Claro family of IP Telephony products — the …
Handbook for Computer Security Incident Response Teams (CSIRTs)
The document is aimed at aiding the planning, creation and development of CSIRTs: teams trained specifically to deal with IT security incidents. One of the principal tasks of …
Meetinghouse and Intersil Enter into Licensing Agreement for AEGIS Authentication API Supporting WPA and Cisco CCX Wireless LAN Security
Agreement for Embedded Security Technology Exclusive to Meetinghouse PORTSMOUTH, NH, May 14, 2003 – Meetinghouse, a leading developer of standards-based network …
Trustix Answers Small Business Needs With Launch of First Linux-based Small Office Server
The most comprehensive offering for small business addresses all server-based applications plus unparalleled security London, UK / 14th May 2003 -Trustix (www.trustix.com), …
The Second Coming Of the “Lovgate” Worm
Kaspersky Labs, an international data security software developer, reports the detection of the five new modifications of the “Lovgate” Internet worm, first …
Linux Security: Public Key and Symmetric Key Encryption
This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Public Key Encryption In order to use public key …
Panda Antivirus Titanium: Awarded “Recommended Product” from BIT Portugal
Panda Software’s leading home-user solution receives yet more international acclaim MADRID, May 12 2003 BIT Portugal, one of the country’s leading IT magazines, …