Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
3Com Launches Revolutionary Vulnerability Discovery Program, Setting The Clock Back On Zero Day Attacks

MALBOROUGH, Mass. July 25, 2005 – 3Com and its TippingPoint division today announced the formation of the Zero Day Initiative (ZDI), aimed at ensuring the responsible …

MDI Receives Product of the Month Award for its ViewPoint Video IP Security Camera

SAN ANTONIO, TEXAS July 25, 2005 – MDI Security Systems, the foundation of MDI, Inc. (NASDAQ: MDII), a recognized leader in delivering open integrated access control, …

Whittles Solicitors guards vital email communications from downtime with SteelEye LifeKeeper for Exchange

Palo Alto, 26th July 2005 Whittles Solicitors, a multiple site legal practice, has deployed SteelEye Technology’s LifeKeeper for Exchange to provide the highest level of …

visKeeper 2.2: The burglar-proof data safe easy as pie for PPC

A brand-new tutorial lets newcomers have a walk-over on the first steps with the patented visKey – technology. The first visual password is generated as quick as a …

New Solution To Detect And Locate Rogue Wireless Networks

Network Utilities (Systems) Ltd, a leading provider of network access security solutions, today announced UK availability of AirPatrol Mobile v2.0TM, a second-generation, …

Linux Security, Audit and Control Guidance Featured In New Book from Information Systems Audit and Control Association

Rolling Meadows, IL, USA (21 July 2005)—More than 10 years after its debut, Linux has matured from a student hobby to a highly respected platform used by major organizations …

Acunetix combats rise in web attacks with Acunetix Web Vulnerability Scanner 2

Malta, 22nd July 2005 – Start-up company Acunetix released Acunetix Web Vulnerability Scanner: a tool to automatically audit website security. Acunetix WVS 2 crawls an …

Weekly Report on Viruses and Intruders – Lebreat worm variants, RemoteLogger and AFXFireWall.A and E-Eliminator malware

Lebreat.A, Lebreat.B and Lebreat.C are three email worms with variable characteristics that can also spread via Internet, exploiting the LSASS vulnerability. The A, B and C …

Study From SBTI And Symantec Exposes Small Business Information Security Gaps And Provides Insight On How To Mitigate Risk

July 20, 2005 The Small Business Technology Institute (SBTI), a US-based non-profit organisation dedicated to fostering technology education and adoption among small …

CyberGuard’s Customers and Partners From Across the Globe Converge on Las Vegas for Annual Advisory Board Meeting

Las Vegas, 20th July 2005 – CyberGuard(r) Corporation (NASDAQ: CGFW), a global provider of security solutions that protect the business-critical information assets of …

Panda Software launches new versions of its corporate products with highly effective anti-phishing protection

The new versions of Panda Software’s corporate solutions incorporate specific anti-phishing technologies in the different layers of corporate networks; at Internet …

Linux Community Embraces Free Distribution Backed By Professional Development Team

New York 20th July2005, Comodo owned Trustix today highlighted a surge in interest in Trustix Secure Linux since making the distribution freely available. A huge growth in …

Don't miss

Cybersecurity news