Help Net Security
Norman Virus Control Receives Virus Bulletin 100% Award
The data security company Norman ASA has received yet another Virus Bulletin 100% Award. This signifies that Norman Virus Control (NVC) found 100% of the viruses reported to …
Baltimore secures DigiNotar’s ‘DigiOverheid’ Service for Issuing Digital Certificates to End Users in the Netherlands
Amsterdam, November 12, 2002: Baltimore Technologies (London: BLM), a global leader in e-security, and DigiNotar, a Dutch Trusted Third Party (TTP) using Baltimore’s …
Creator of Gokar and Redesi Worms Faces Charges
A web designer from Llandudno, North Wales, has appeared in court in connection with creating and distributing three mass-mailing computer viruses: Gokar, Redesi and Admirer. …
The changing face of web security
Are we winning or losing the battle of web security? Read this white paper backed by industry figures to ensure you are aware of the facts. Download the paper in PDF format here.
What makes a good Password?
The first thing to understand, is what makes a bad password. The worst passwords are: password, 111111, fred, master, boss and whatever is the name of your …
An introduction to PKI
This guide provides the reader with a basic introduction to key terms and concepts used in a PKI including Certificates, Keys and Authorities. It mentions the features and …
Network Associates Extends Leadership Position with McAfee Online Managed Security Services
McAfee Security’s Online Services Detect and Clean More Than 60 Million Infected Files SANTA CLARA, Calif., Nov. 13 /PRNewswire-FirstCall/ — McAfee Security, a …
Network Associates Expert Services Organization Expands Security Educational Offerings
New Sniffer University Online Courses Educate Network and Security Professionals to Address Growing Blended Security Threats from Anywhere in the World SANTA CLARA, Calif., …
PureEdge Announces Support for XForms
Internet Commerce System to Provide Secure “Wrapper” For Auditable XForms Transactions Victoria, BC (November 12, 2002) – PureEdge Solutions Inc. …
Fourth Anniversary of Bubbleboy and Self Executing Viruses
This month marks the fourth anniversary of Bubbleboy, the first malicious code to run automatically -without user intervention- by exploiting a vulnerability in MS Outlook and …
TriGeo Unveils Future of Security Information Management at 29th Annual CSI Show
Contegoâ„? Software Provides Active Response To Protect From The Perimeter To The Desktop POST FALLS, ID – TriGeo Network Security, Inc., the rapidly growing …
New Report says Rainbow’s iKey is the Worldwide Market Share Leader for USB Authentication Keys
New Internet Security Report Says the USB Token Market will have substantial growth due to Low Price and Greater Convenience IRVINE, Calif., November 11, 2002 – A recent …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do