Please turn on your JavaScript for this page to function normally.
Trend Micro Posts Record First-Half Revenue

Net sales climbed 35% to 12,939 million yen Tokyo, Japan, August 3, 2001-Trend Micro Incorporated (Nasdaq: TMIC, Tokyo Stock Exchange: 4704), a leading provider of enterprise …

Sophos: Top Ten Viruses In July 2001

This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses as compiled by Sophos, a world leader in corporate anti-virus …

Rumors Surrounding the “Code Red” Epidemic Are Just That – Rumors

As previously reported, some US and British organizations spread the word at the beginning of this week about a possible repeat of the “Bady” (Code Red) …

Firefighters Extinguish Email Threats With Gfi’s Mail Essentials

Keizer Fire District uses Mail Essentials for Exchange London, UK, 2 August 2001 – The Keizer Fire District in Oregon, USA deals with emergencies every day but one …

Sybari Customers Report Antigen Worm Purge & File Filtering Deliver Superior Protection From SIRCAM

EAST NORTHPORT, N.Y.–(BUSINESS WIRE)–Aug. 2, 2001–Sybari Software, Inc., the premier developer of Antigen, a comprehensive antivirus, content-management, and …

F-Secure warns: Code Red is not dead

Helsinki-Finland, August 1, 2001 – F-Secure Corporation (HEX: FSC) is alerting computer users worldwide that the Code Red worm is starting up again. As has been widely …

PatchLink Update 3.0 Protects Beta Customer From Code Red Worm

SCOTTSDALE, Ariz.–(BUSINESS WIRE)–Aug. 1, 2001– PatchLink Update 3.0, Currently in Beta and Available Q3, Will Greatly Ease The Discovery and Deployment of …

Hush Communications prepared as Digital signatures go legal in the European Union

Dublin, Ireland – August 1st 2001 – New legislation passed by the European Union now makes digital signatures officially legal in the EU, giving them equal status …

Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT/2000/XP

Most buffer overflow exploits for Windows have relied on getting code on the stack and somehow jumping process execution to there, but as more products arrive in the market to …

Assessing IIS Configuration Remotely

This document will look at the relatively unsung skill of assessing the in-depth configuration of a Microsoft IIS web server remotely, showing how to “read” server …

Understanding Security

What is security? Process, procedures, and tools that assure data can be stored reliability and retrieved by those authorised users… Download the paper in PPT format here.

HTML Form Protocol Attack

This paper describes how some HTML browsers can be tricked through the use of HTML forms into sending more or less arbitrary data to any TCP port. This can be used to send …

Don't miss

Cybersecurity news