Help Net Security
Reverse Engineered Slapper Worm
F-Secure reverse engineered worms network protocol — real-time information on number and location of infected computers The Linux.Slapper worm was first seen on Friday …
F-Secure Warns About a New Linux Worm
Helsinki, Finland – September 14th. F-Secure Corporation is warning about a new network worm called Slapper. Slapper is a network worm that spreads on Linux machines, …
Cyota and nCipher Strengthen Relationship to Deliver e-Payments Security Solutions
The companies to explore new directions and products for payments security in addition to Verified by Visa and MasterCard SPA New York, NY and Woburn, MA (September 9, 2002) …
Keep e-commerce secure by disconnecting your servers from the Internet
While it sounds strange, disconnecting your e-commerce servers from the Internet is exactly what SpearHead Security Technologies would have you do – using their NetGAP …
PivX Analyzes Microsoft’s Service Pack 1 for Internet Explorer, Finds 19 Vulnerabilities
Newport Beach, CA, September 12, 2002 : PivX Solutions, a leader in Network Security has completed it’s analysis of the long awaited Service Pack 1 for Microsoft …
GFI’s Email Security Testing Zone Launches a New Test
Allows admins to test the vulnerability of their networks to the newly found fragmented message vulnerability London, UK, 12 September 2002 – GFI’s Email Security …
US. Government Customer Expands Deployment Of Datakey Smart Card Technology
MINNEAPOLIS, Sept. 11, 2002 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a trusted developer of smart card solutions for securing enterprise-wide personal …
Sophos: September 11th Worm is a Distasteful Attempt
Sophos, a world leader in corporate anti-virus protection, has received several reports from computer users concerned about the brand new Chet worm (W32/Chet-A), an email …
F-Secure Informs About a 9/11 Themed Worm
F-Secure Corporation informs that it has received copies of a new Windows e-mail worm called “Chet”. This worm is themed around the September 11th terrorist …
We Will Find the Way …
Article by: Dr Anton Zajac – VP, Eset SoftwareCourtesy of Virus Bulletin When Hannibal led his troops through the freezing peaks of the snow-covered Alps, he declared: …
Identix Fingerprint Technology Adopted by Several Major Healthcare
Institution As HIPAA Deadline Approaches, More Hospitals and Clinics Move To Comply With Privacy Requirements MINNETONKA, Minn., Sept. 9 /PRNewswire-FirstCall/ — Identix …
Astaro Content Filtering Process
Traditional Internet filtering methods depend on manually compiled blocking lists, individual ratings or online applied heuristics algorithms. These methods are, for the most …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)