Realtime’s Identity Management For SAP Solutions Now Also Available With Smart-Card Functionality
realtime North America, Inc. (www.realtimenorthamerica.com) has announced that its award-winning bioLock software is immediately available with smart-card functionality and …
Aladdin Extends eToken OEM Partnership Agreement with VeriSign
CHICAGO, October 13, 2004, – Aladdin Knowledge Systems, Ltd. (NASDAQ: ALDN) today announced it has extended a partnership agreement with VeriSign that allows VeriSign to …
Finnet Selects F-Secure to Offer Hosted Security Services
Helsinki, Finland – October 13th, 2004. F-Secure Corporation (HEX: FSC), and Finnet Ltd today announced that they have signed a partnership to offer managed desktop …
Forum Systems and F5 Form Technology Alliance Offering Interoperable Web Ervices And Traffic Management
Salt Lake City, UT – October 12, 2004 – Forum Systems, Inc., leading provider of trust management and threat protection Web services security solutions, today …
Trojan Horse Disguised Horse As Sleazy David Beckham Photographs
Experts at Sophos have warned computer users that a file posing as photographic evidence that international soccer star David Beckham has been having an affair is in fact …
Andrews Kurth Shields Internal Network with Mirage Networks
Austin, TX – October 11, 2004 – Mirage Networks, Inc., the pioneer in security solutions for Interior Network Defense, today announced that Andrews Kurth, a …
Cyberguard Develops Innovative, Secure Wireless Network Solution For Leading Online Retailer
Ft. Lauderdale, Fla. (October 11, 2004) – CyberGuard Corporation, (Nasdaq:CGFW) the technology leader in network security, today announced that it has developed a custom …
Free Vulnerability Scan Now Available for New SANS Top-20
Qualys, Inc., the leading provider of on-demand vulnerability management solutions, today released a free network scanning service to help companies find and eliminate the …
Symantec Completes @stake Acquisition
Symantec Corp. (Nasdaq: SYMC), the global leader in information security, today announced the acquisition of @stake, originally announced on Sept. 16, 2004, has been …
Weekly Report on Viruses and Intruders – JPGTrojan.C and Keylogger-Pro
JPGTrojan.C is a program that allows JPG images to be created which exploits the Buffer Overrun in JPEG processing vulnerability (described in the Microsoft bulletin …
Syngress Publishing Announces Publication of Anticipated Nessus Book
Rockland, MA October 7, 2004 – Syngress Publishing, Inc., today announced the publication of “Nessus Network Auditing” (ISBN: 1-931836-08-6), co-authored by …
Spam Volumes Dip Following Onslaught of September Hurricanes
October 8, 2004 – FrontBridge Technologies Inc., the leader in enterprise message management and email security, today announced that spam volumes reached a record peak …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA