Help Net Security
Fourth Anniversary of Bubbleboy and Self Executing Viruses
This month marks the fourth anniversary of Bubbleboy, the first malicious code to run automatically -without user intervention- by exploiting a vulnerability in MS Outlook and …
TriGeo Unveils Future of Security Information Management at 29th Annual CSI Show
Contegoâ„? Software Provides Active Response To Protect From The Perimeter To The Desktop POST FALLS, ID – TriGeo Network Security, Inc., the rapidly growing …
New Report says Rainbow’s iKey is the Worldwide Market Share Leader for USB Authentication Keys
New Internet Security Report Says the USB Token Market will have substantial growth due to Low Price and Greater Convenience IRVINE, Calif., November 11, 2002 – A recent …
Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection
Wireless LAN discovery through the use of applications such as NetStumbler, DStumbler, Wellenreiter and others is an increasingly popular technique for network penetration. …
Timing the Application of Security Patches for Optimal Uptime
Security vulnerabilities are discovered, become publicly known, get exploited by attackers, and patches come out. When should one apply security patches? Patch too soon, and …
Host Discovery with nmap
As a Computer Security Engineer that regularly conducts external penetration tests, a recurring challenge seems to arise when assessing organizations with a large allocation …
RSA Security Combines Building and Network Access With New RSA Smart Badging Solution
RSA Smart Badging Solution is designed to integrate multiple applications on a single smart card for enhanced security with support of certificate-based authentication CSI …
NetContinuum Transforms Enterprise Security Market With Introduction of All-in-One Web Security Gateway
Most Powerful Security ASIC Ever Built Enables NetContinuum to Deliver Comprehensive Web Security in a Single Easy-to-Deploy Appliance Santa Clara, California – …
Neoteris Unveils Next-Generation Secure Access Product Family of Instant Virtual Extranets
IVE 3.0 Release Delivers Enhanced Performance Scalability and High Availability to Further Address Secure Information Access Needs of Enterprises. CHICAGO – Nov. 11, …
Information Security Editor-in-Chief To Lead Special Keynote Panel at Comdex Fall 2002
Editor-in-Chief of Leading Trade Publication to Moderate Two Panels; Special Keynote Session to Cover the Future of IT Security and Digital Risk Editor-in-Chief Andrew Briney …
New NetScreen-5XT Features Enhance Security and Resiliency for Remote Sites
Guildford, U.K., Nov. 11, 2002 — NetScreen Technologies, Inc. (Nasdaq: NSCN), has announced new features for the NetScreen-5XT that increase the level of security and …
Vulnerabilities in Microsoft’s Java implementation
Overview Microsoft Internet Explorer comes with Java virtual machine and accompanying class packages. Multiple security vulnerabilities have been found in the Java …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)