Help Net Security
McAfee Parental Controls Helps Parents Keep a Watchful Eye on Their Children’s Internet Activity
New Product Features Age-Specific Settings for Web Pages, Chat Filtering, Objectionable Word Filtering, and Internet Time Limits SUNNYVALE, Calif., Nov. 25 /PRNewswire/ …
Abtrusion Protector 1.1 Supports New Platforms and More Users
Abtrusion Protector 1.1 Supports New Platforms and More Users Avesta, Sweden – November 25, 2002 Abtrusion Security AB today released a new version of its popular …
Utimaco Software: Results of the First Quarter of the Fiscal Year 2002/2003
Results of the first quarter of the fiscal year 2002/2003 Restructuring on track Continued business grown by 12 per cent Gross profit on sales grown by 23 per cent November …
Weekly Virus Report – Klez Dominance and Bride Worm
Virus news this week has centered around the appearance of Bride.B, and the continued dominance of Klez.I (W32/Klez.I) and Bugbear (W32/Bugbear) in the leading positions of …
Forensic IT Trends Survey 2002
What are the trends in forensic IT reseach? Which tools are used? What are the objectives of a forensic IT investigation? These questions are answered in this small survey. …
Kaspersky Labs Opens Regional Office in France
Kaspersky Labs, an international data-security software developer, announces the expansion of its regional office network with the opening of an office in Sophia Antipolis, …
RAV AntiVirus for Samba (Linux) Released
GeCAD Software, RAV AntiVirus manufacturer, has recently released RAV AntiVirus for Samba (UNICES), to provide reliable protection of valuable data for those relying on Linux …
Taking a Crack at Hackers; New Book Helps Attorneys, Executives Combat Cyberthreats
EAGAN, Minn., Nov. 21 /PRNewswire/ — The 1999 launch and resulting shockwave caused by the “Melissa Virus” — the first major e-mail-based virus — …
A matter of trust or is it?
Who do you know who you are really dealing with when disclosing your personal details over the Internet? How can you ensure the credit card details you submit are to the site …
Authentication – who’s site is it really?
There are many issues in the business of authentication, and methods by which it is achieved, that are worth discussing at some length, but that is not the topic of this paper …
Computer Virus Families: Origins and Differences
Klez.F and Klez.I or Opaserv, Opaserv.D and Opaserv.H are just some examples of malicious code which due to common characteristics and roots are grouped into families by the …
SSH and eracom Partner To Provide High-Speed Cryptographic Processing With Digital Certificate Management
Helsinki, Finland and Krefeld, Germany – Nov. 19, 2002 – SSH Communications Security (HEX:SSH1V), a world-leading developer of Internet security solutions, and …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments