Cyber-Ark Software and Mideye Team Up To Provide Two Factor Authentication Via Mobile Phone
London – Jan 9, 2006 — Cyber-Ark(r) Software Inc., the leader in Vaulting Technology(tm) for securely connecting enterprises, announced a collaboration with …
CyberGuard Firewalls Protect Applications for BT Global Services
Bracknell, UK, 9th January , 2006 – CyberGuard(r) Corporation (NASDAQ: CGFW), a global provider of security solutions that protect the business-critical information …
eEye Digital Security’s Blink Endpoint Vulnerability Prevention Solution Proactively Protects from WMF Exploit
ALISO VIEJO, Calif., January 5, 2005 – eEye Digital Security®, a leading developer of network security and vulnerability management software solutions, as well as the …
Weekly Report on Viruses and Intruders – WMFMaker, Gaobot.LTL and Mytob.MF
WMFMaker is a program for creating WMF (Windows MetaFile) images that exploit a critical vulnerability in Graphics Rendering Engine. This vulnerability lies in how Windows …
Panda Software advices caution in the face of the possible return of Sober
The epidemic caused by the Sober.AH worm last November could undergo a resurgence if, as its code indicates, it activates between January 5 and 6. According to PandaLabs, this …
Elemental Security Compliance Management Product Named Best Network Access Controller By Infoworld
SAN MATEO, Calif. – Jan. 4, 2006 – Elemental Security, Inc., an award-winning pioneer of new technology in enterprise information security, today announced that …
Sophos Appoints New CEO
Sophos, a world leader in protecting businesses against viruses, spyware and spam, has today announced the appointment of Steve Munford to the role of chief executive officer …
Yankee Group Names NetContinuum as First Traditional Web Application Firewall Vendor to Stake Claim in New Application Assurance Platform Market
January 3, 2006 —Santa Clara, CA — NetContinuum, the leader in Web Application Firewalls and Secure Application Gateways, today announced that it has been named a market …
Tool for camouflaging threats in WMFs discovered, informs Panda Software
PandaLabs has detected a tool called WMFMaker being distributed across the Internet. This tool allows malicious WMFs to be generated from any other code, which allows malware …
PassGo Technologies’ Double Entry in SC Magazine Best Of 2005
Pittsburgh PA (PRWEB) January 1, 2006 — In the SC Magazine Best-Of 2005 roundup PassGo appears with both Defender 5.1 and Unix Privilege Manager, UPM, with Defender …
Weekly Report on Viruses and Intruders – Nabload.U, Banker.BSX and AKStealer.A
This week Nabload.U and Banker.BSX have caused thousands of incidents in computers around the world and have become the malware specimens most frequently detected by the free …
Several new Trojans attack via the extremely critical WMF vulnerability
Kaspersky Lab, a leading developer of secure content management solutions which protect against viruses, hackers and spam, has detected a range of Trojan programs which …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)