Help Net Security
Unix Shell Scripting Malware
Article by: Marius van Oers, McAfee AVERT, The Netherlands Courtesy of Virus Bulletin Unix/Linux binary malware can be very dependent upon distribution flavour and kernel …
Security in Plan 9
The security architecture of the Plan 9 operating system has recently been redesigned to address some technical shortcomings. This redesign provided an opportunity also to …
Secos And Security Focus Partner To Deliver Real-Time Vulnerability Data
Irvine, CA – July 25, 2002- Secos, dedicated to the development of globally focused technology, offering network, transaction, content, and system security, today …
Panda Software’s Perimeterscan Released
Panda Software, international antivirus software developer, has released the beta version of Panda PerimeterScan ISA Server Edition. ISA Server is one of the most widely-used …
Resilience DX4000 Integrated High Availability Security Appliance Achieves “Secured by Check Point” Certification
New Resilience VPN/Security Appliance Delivers Unsurpassed Price/Performance Sunnyvale, CA – July 22, 2002 – Resilience Corporation, the leading provider of …
Symantec’s Norton AntiVirus 2002 Wins Editors’ Choice in CNET Roundup
Norton AntiVirus Bests Field of 10 to be Named ‘Best in the Biz’ CUPERTINO, Calif. – July 23, 2002 – Symantec Corp. (Nasdaq: SYMC), the world leader in …
ISA Server Now Protected by Panda Software’s Perimeterscan
Panda Software, international antivirus software developer, has released the beta version of Panda PerimeterScan ISA Server Edition. ISA Server is one of the most widely-used …
Trusted Paths for Browsers: An Open-Source Solution to Web Spoofing
This paper reports the results of our work to systematically defend against Web spoofing, by creating a trusted path from the browser to the user. Starting with the Mozilla …
BitDefender Adds a Privacy Control Module to BitDefender Professional
Bucharest, Romania – July 21, 2002 – Following several international organizations’ warnings against the frequent invasions of privacy, BitDefender, a …
Datakey Announces Second Quarter Results
Second Quarter Revenues Increase 77 Percent Over Last Year MINNEAPOLIS, July 23, 2002 – Datakey Inc. Nasdaq: DKEY, a leading developer of smart card technology for …
Secure Execution Via Program Shepherding
We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. Program shepherding provides three …
Panda Antivirus for Novell Netware 6 Beta Released
Panda Antivirus for Novell Netware 6 seamlessly integrates the most sophisticated antivirus technology with the latest version of Novell’s networking tool. The solution …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?