Help Net Security
A Note on Proactive Password Checking
Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In …
Arrest for Slapper Worm Author
As we mentioned yesterday, ISS released an advisory saying that a new Slapper variant (called .B of course) is out there. One of the new functions was that the worm mailed …
OWASP Guide to Building Secure Web Applications version 1.1
The Guide covers various web application security topics from architecture to preventing attack specifics like cross site scripting, cookie poisoning and SQL injection. The …
Experian Uses RSA Security Technology to Expedite Credit Checks
RSA ClearTrust® Web access management solution locks down sensitive data and allows single sign-on for multiple e-commerce services Bedford, MA, Monday, September 23, 2002 — …
Check Point Unveils Roadmap for Multi-Vendor Security Management
Best-of-Breed Approach Integrates Solutions From Over 325 Partners — to be Outlined at OPSEC Developer’s Conference REDWOOD CITY, Calif., Sept. 23, 2002 — Check …
Microsoft Deploys Activcard Identity Management System
ActivCard Identity Technology Selected by Microsoft IT Security Group for Largest Deployment of New Corporate ID Badges FREMONT, CA – September 23, 2002 – …
Activcard Unveils Activcard Identity Management System
Product Developed For U.S. Department Of Defense Makes It Easier To Deploy Digital Identities Across The Enterprise Microsoft® Corporation Adopts AIMS To Manage Employee Smart …
ISS Alerts on Slapper Worm Modification
In a latest alert, Internet Security Systems noted that there is a new version of Slapper worm out there. The modification, called Slapper.B has some changes: Slapper.B has a …
Bull Evidian Adds Ubizen Professional Services to its List of Web Security Resellers
Ubizen adds Bull Evidian’s web access control, single sign-on and business continuity software to its portfolio of best-of-breed third party productsParis, September 19, …
Security Online
When a computer connects to a network in an office for example, a world of working possibilities opens up to employees: sharing documents, messaging, instant access to data in …
The European IT Oscar Goes To BitDefender
European elite rewards innovation in technologyBucharest, Romania – September 23, 2002 – BitDefender, a European technological leader in antivirus security …
T0rn Kit Writer Suspect Arrested in UK
Police arrested a 21-year-old man suspected of writing the malicious “T0rn” rootkit that attacked Linux computer systems, the culmination of a year-long joint …
Featured news
Resources
Don't miss
- Radio signals could give attackers a foothold inside air-gapped devices
- Product showcase: RoboForm password manager for iOS
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken