Help Net Security
Oracle Performance Tuning
Writing a good Oracle performance tuning book involves a lot of time and effort. To us, as readers, this book will offer a good fundamental knowledge and serve as a good lead …
Teaching How To Create Malicious Code
In universities around the world, a question has arisen about computer studies syllabuses: should students be taught how to create viruses and malicious code? There are …
IBM ISV Trustix Strengthens UK Team
Paul Walker joins Trustix as Technical Sales Manager for the UK London, UK – 10th June 2003: Trustix (www.trustix.com), Norwegian turnkey Linux security and …
Online Credit Card Transactions Go Mobile
Arcot Systems and Diversinet partner to develop mobile authentication for online credit card transactions SANTA CLARA, California and TORONTO, Canada – June 9, 2003 …
Neoteris Adds NetIQ to Leading Technology Partnership Base
Relationship Enables Seamless Interoperability with Popular NetIQ ProductsMOUNTAIN VIEW, Calif. – June 9, 2003 – Neoteris, Inc., the leading instant secure …
SSH Certifier to Provide Secgo with a Flexible, Scalable Authentication Platform for Using and Managing Digital Certificates
HELSINKI, FINLAND and TOKYO – June, 10, 2003 – SSH Communications Security (HEX:SSH1V), a world-leading developer of managed security middleware, and Secgo Group, …
F-Secure Delivers Information Security to Alma Media
Helsinki, Finland, June 10, 2003 – – F-Secure Corporation (HEX: FSC) will provide the F-Secure Anti-Virus Total Suite product family to the Alma Media Group, a …
Bugbear.B on the Increase Again as Businesses Return to Work
Madrid, June 9, 2003 – As Panda Software’s virus experts had predicted, the return to work on Monday saw the renewed activity of the Bugbear.B worm, which is …
ActivCard Announces Commencement of Follow-on Exchange Offer
FREMONT, Calif. and SURESNES, France, June 9 /PRNewswire-FirstCall/ — ActivCard Corp. (Nasdaq ACTI; Nasdaq Europe: ACTI) and ActivCard S.A. today announced that …
SonicWALL Pro
SonicWALL's line of firewalling appliances are recommended for small- to medium-sized networks in various environments. Their ease of setup and configuration make them ideal …
Unix Security: The FormMail Hack
Is your Web server being used as a Spam Mail relay? It could be, and it doesn’t even need a daemon listening on the SMTP port. How’s it done, and how do you …
Credit Card Details At Risk From New Bugbear-B Virus, Warns Sophos
Sophos, a world-leader in anti-virus protection for businesses, has found that the widely spreading Bugbear-B virus, first detected on Thursday 5th June, contains a …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)