3Com Launches Revolutionary Vulnerability Discovery Program, Setting The Clock Back On Zero Day Attacks
MALBOROUGH, Mass. July 25, 2005 – 3Com and its TippingPoint division today announced the formation of the Zero Day Initiative (ZDI), aimed at ensuring the responsible …
MDI Receives Product of the Month Award for its ViewPoint Video IP Security Camera
SAN ANTONIO, TEXAS July 25, 2005 – MDI Security Systems, the foundation of MDI, Inc. (NASDAQ: MDII), a recognized leader in delivering open integrated access control, …
Whittles Solicitors guards vital email communications from downtime with SteelEye LifeKeeper for Exchange
Palo Alto, 26th July 2005 Whittles Solicitors, a multiple site legal practice, has deployed SteelEye Technology’s LifeKeeper for Exchange to provide the highest level of …
visKeeper 2.2: The burglar-proof data safe easy as pie for PPC
A brand-new tutorial lets newcomers have a walk-over on the first steps with the patented visKey – technology. The first visual password is generated as quick as a …
New Solution To Detect And Locate Rogue Wireless Networks
Network Utilities (Systems) Ltd, a leading provider of network access security solutions, today announced UK availability of AirPatrol Mobile v2.0TM, a second-generation, …
Linux Security, Audit and Control Guidance Featured In New Book from Information Systems Audit and Control Association
Rolling Meadows, IL, USA (21 July 2005)—More than 10 years after its debut, Linux has matured from a student hobby to a highly respected platform used by major organizations …
Acunetix combats rise in web attacks with Acunetix Web Vulnerability Scanner 2
Malta, 22nd July 2005 – Start-up company Acunetix released Acunetix Web Vulnerability Scanner: a tool to automatically audit website security. Acunetix WVS 2 crawls an …
Weekly Report on Viruses and Intruders – Lebreat worm variants, RemoteLogger and AFXFireWall.A and E-Eliminator malware
Lebreat.A, Lebreat.B and Lebreat.C are three email worms with variable characteristics that can also spread via Internet, exploiting the LSASS vulnerability. The A, B and C …
Study From SBTI And Symantec Exposes Small Business Information Security Gaps And Provides Insight On How To Mitigate Risk
July 20, 2005 The Small Business Technology Institute (SBTI), a US-based non-profit organisation dedicated to fostering technology education and adoption among small …
CyberGuard’s Customers and Partners From Across the Globe Converge on Las Vegas for Annual Advisory Board Meeting
Las Vegas, 20th July 2005 – CyberGuard(r) Corporation (NASDAQ: CGFW), a global provider of security solutions that protect the business-critical information assets of …
Panda Software launches new versions of its corporate products with highly effective anti-phishing protection
The new versions of Panda Software’s corporate solutions incorporate specific anti-phishing technologies in the different layers of corporate networks; at Internet …
Linux Community Embraces Free Distribution Backed By Professional Development Team
New York 20th July2005, Comodo owned Trustix today highlighted a surge in interest in Trustix Secure Linux since making the distribution freely available. A huge growth in …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader