Please turn on your JavaScript for this page to function normally.
Cisco Extends Leadership in Integrated Network Security

New management, performance, and scalability extensions enhance and protect business productivity SAN JOSE, Calif., May 20, 2003 – Cisco Systems, Inc. today announced 14 …

Matrix Hacking – A Slice of Reality in a World of Make Believe

It might be all make believe, but the film – The Matrix: Reloaded – has opted for reality in one of its most important scenes, the hacking of the computer that …

Sophos Offers Free Web Updates To Protect Journalists From Computer Viruses

Sophos, a global leader in anti-virus protection for businesses, is offering freelance and home-office based journalists free anti-virus software which can be easily …

BASEL II: Everyone is in the Risk Business Now

Managing risk used to be straightforward process, but all that is about to change for the world’s central banks and their IT departments. Basel II, the accord which …

Intrusion Inc. Doubles Performance of Two Most Popular IDS Sensors

RICHARDSON, Texas–(BUSINESS WIRE)–May 20, 2003– Intrusion Inc. Leads in Price/Performance with Double the Performance and New Lower Prices for the Two Most …

PC-Duo Enterprise Remote Control v8 Provides Flexible Encryption

New remote control module of PC-Duo Enterprise adds flexibility for increased performance and security Tamworth, Staffordshire, UK – 20th May 2003 – Vector …

Taicom Chooses SSH Communications Security to Secure its VPN Router Series

HELSINKI, FINLAND; PALO ALTO, Calif. and TOKYO – May 20, 2003 – SSH Communications Security (HEX:SSH1V), a world-leading developer of Internet security solutions, …

Sobig.B Worm is Spreading at an Alarming Rate

F-Secure is raising the alert to the highest level as Sobig.B infections have been reported from over 80 countries worldwide. Sobig.B (also known as Palyh or Mankx) was first …

Neoteris Delivers Instant Secure Application Access To SAS For Mobile Consultants, Partners And Employees Throughout EMEA

SAS Selects Neoteris’ IVE to Enable Instant Secure Access to Enterprise Applications While Protecting Network from Unauthorized Access and Vulnerabilities FRANKFURT …

The Palyh Worm Appears as A Communique From Microsoft

Kaspersky Labs, an international data security software developer, reports the detection of a new network worm named “Palyh”, which is spreading via email and …

Palyh Worm Disguised as Microsoft Email

Sophos, a global leader in anti-virus protection for businesses, has warned that a new email-aware worm is spreading, disguised as an email appearing to come from …

TCP/IP Bible

TCP/IP is the protocol suite that runs almost every network environment today. Consequently there are tons of books about TCP/IP - some deal with network implementation …

Don't miss

Cybersecurity news