Help Net Security
ComputerLinks Becomes Distribution Partner of Utimaco Safeware
Completion of the e-security portfolios of ComputerLinks by a comprehensive platform for workstation security Oberursel/Munich, September 3, 2002 – ComputerLinks has …
Activcard Expands Global Presence
Sales Office Opened in South Africa to Extend Availability of ActivCard Identity Management Software and Solutions SANDTON, SOUTH AFRICA – 3 September, 2002 — …
Threat Profiling Microsoft SQL Server
This paper is written from the perspective of an attacker and shows typical “cursi incursi” for Microsoft SQL Server. An attacker’s location in the …
Sophos Anti-Virus Receives West Coast Checkmark
Sophos Anti-Virus receives West Coast Checkmark for 100% detection of in-the-wild viruses yet again Sophos announced today that its flagship product, Sophos Anti-Virus, has …
SSL – A discussion of the secure socket layer
The Secure Socket Layer is the protocol that gives e-commerce the confidence it needs to allow on-line banking and shopping. SSL provides and encrypted bi-directional data …
Panda Software Now Compatible with Citrix Metaframe 1.8
Panda Software, leading international antivirus developer, has announced the compatibility of its antivirus for NT and 2000 file servers with the Citrix Metaframe 1.8 …
IDC Confirms Trend Micro is Worldwide Leader in Server-Based Antivirus Software Market for Second Consecutive Year
Trend Micro grows fastest worldwide among top three antivirus vendors at 31% year over year Cupertino, CA, August 30, 2002 – According to a recently published report …
Kaspersky Labs: Virus Top 20 for August 2002
Kaspersky Labs presents the latest top-20 list of the most wide-spread malicious programs in August 2002. The numbers represent the percentage of infections caused by certain …
Sophos: Top 10 Viruses and Hoaxes in August 2002
This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses and hoaxes as compiled by Sophos, a world leader in corporate …
Central Command: Top 12 Viruses For August 2002
W32/Yaha.E Dethrones Worm/Klez.E Taking Top Spot, KaZaa And Other File-Sharing Users Still At Risk Central Command, a leading provider of PC anti-virus software and computer …
Monitored Intrusion Detection Systems
Most enterprise networks are protected from the Internet by firewalls. While firewall protections are essential, they rarely identify types of attacks, or attacks on allowed …
Secure Personal Identification Systems: Policy, Process and Technology Choices for a Privacy-Sensitive Solution
This paper describes policy, process and technology issues that need to be considered in implementing a privacy-sensitive secure personal ID system. The different ID …