Help Net Security
F-Secure Informs About a 9/11 Themed Worm
F-Secure Corporation informs that it has received copies of a new Windows e-mail worm called “Chet”. This worm is themed around the September 11th terrorist …
We Will Find the Way …
Article by: Dr Anton Zajac – VP, Eset SoftwareCourtesy of Virus Bulletin When Hannibal led his troops through the freezing peaks of the snow-covered Alps, he declared: …
Identix Fingerprint Technology Adopted by Several Major Healthcare
Institution As HIPAA Deadline Approaches, More Hospitals and Clinics Move To Comply With Privacy Requirements MINNETONKA, Minn., Sept. 9 /PRNewswire-FirstCall/ — Identix …
Astaro Content Filtering Process
Traditional Internet filtering methods depend on manually compiled blocking lists, individual ratings or online applied heuristics algorithms. These methods are, for the most …
Check Point Software Unveils New SmartLSM
First Solution to Enable Simple VPN/Security Deployment and Management for Up to One Thousand Franchise Locations REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …
Research Firm Recognizes Check Point as VPN Market Leader
Leader Position Based on Ability to Execute and Completeness of Vision REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point Software Technologies Ltd. (Nasdaq: CHKP), the …
Check Point Software And Internet Security Systems Secure Networld+Interop and COMDEX Event Network
Check Point and ISS Provide Integrated Security Framework with Best-of-Breed Technology for Largest Short-Term Network REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …
Baltimore Technologies Plc Announces Restructuring Close to Completion and Half-Year Results in Line with Expectations for 6 Months Ended June 30 2002
London, UK – September 10, 2002 – Baltimore Technologies (London:BLM), (“Baltimore”) today announced its interim results for the six months ended 30 …
The Weakest Link in Disaster Recovery
Much of the focus of disaster recovery planning is on creating redundant data sites and backup tapes. Very often, a crucial component is overlooked: that of keeping current …
Ositis Ships SiteStripper
SiteStripper Increases Productivity, Manages Resources and Enforces Policies to Prevent Employees from Accessing Prohibited Websites Pleasanton, CA — September 6, 2002 …
Trend Micro to Join Nikkei Stock Average
Tokyo, Japan – September 9, 2002 – Trend Micro Inc. (TSE: 4704, Nasdaq:TMIC), a leading provider of antivirus and Internet content security software and services …
SSH Communications Security Achieves Opsec Certification From Check Point Software
SSH Certifier Integrates with Industry’s Most Recognized Security Framework HELSINKI, FINLAND and PALO ALTO, Calif. – Date 10, 2002 – SSH Communications …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer