Help Net Security
CREDANT Technologies Adds Personal Firewall to its Awarding-Winning CREDANT Mobile Guardian Security and Management Software Platform
Washington, DC – June 7, 2004 – CREDANT Technologies(R), the market leader in providing software that enables organizations to control security enterprise-wide for …
SafeNet and Adobe Team to Deliver Secure Document Services
Baltimore, Md. – June 8, 2004 – SafeNet, Inc. (NASDAQ: SFNT), setting the standard for information security, today announced that the company’s Luna Series …
Cisco and Trend Micro Extend Security Relationship to Deliver Network Worm and Virus Outbreak-Prevention Services
SAN JOSE, Calif., June 7, 2004 -Cisco Systems, Inc. and Trend Micro Inc., today announced a joint collaboration to deliver comprehensive network worm and virus …
Syngress Publishing Announces Second Edition of Snort Bestseller
Rockland, MA–June 3, 2004–Syngress Publishing, Inc., today announced the publication of “Snort 2.1 Intrusion Detection, Second Edition” (ISBN: …
Intellitactics CEO Randall K. Davis To Address CSOs At 6th Annual Techno Security Conference
6th Annual Techno Security Conference, Booth # 502, Myrtle Beach, SC, June 7, 2004?‚—Intellitactics, Inc., provider of the premier Information Security Management solution …
AEP Systems Appoints Baltimore Technologies as Premier Partner In Japan
Dublin, Ireland – June 8, 2004 – AEP Systems, the high-speed security solutions company is pleased to announce that Baltimore Technologies Japan, a technology …
A Fiver Buys Access & Log-In Codes To Major Financial Services Group
The current access codes and admin rights to the secure Intranet of one of Europe’s largest financial services group was purchased on a hard drive over e-bay for just …
Sharp Zaurus Linux-based Mobile Data Terminal Now Secured for Wireless Business Use with AEGIS Client from Meetinghouse
PORTSMOUTH, NH – June 08, 2004 — Meetinghouse, a leading developer of standards-based network authentication software for wired and wireless local-area networks, …
Secure Development: A Polarised Response
Thankfully these days’ assessing the security of an application prior to implementation is a normal process for most organisations. Organisations accept the view that …
First International Digital Evidence Web Conference Confirms All-Star Speaker Line-up
DIGEV 2004 (24-25 June 2004, www.digev2004.com) is promising to become one of this year’s key fixtures in the digital event conference calendar with law enforcement, …
Norman Announces its Membership in the Microsoft Certified Partner Program
Oslo, Norway. Jun-04, 2004, Norman ASA – an antivirus specialist in protection against new and unknown viruses, worms and trojans- today announced it is a new member in …
Weekly Report on Viruses and Intrusions – Plexus.A, Cult.J and four variants of Korgo Worm
In this week’s report we are going to look at six worms -Plexus.A, Cult.J and four variants of Korgo-, and at Protoride.gen. Plexus.A spreads via the Internet by …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it