Please turn on your JavaScript for this page to function normally.
Weekly Virus Report – Fizzer Worm and Lovgate Variants

This week’s virus report looks at Trifor (Trj/Trifor), the dangerous Fizzer worm (W32/Fizzer), and the I, J, K, L and M variants of the Lovgate worm. Trifor is a Trojan …

Flaw in Fizzer’s Code Provides Vital Hint of Infection

The Fizzer worm (W32/Fizzer-A), which has this week spread via email, file-sharing networks and internet relay chat, has been found by Sophos researchers to contain a bug …

Macrovision Launches SafeDisc Copy-Protection for Mac OS X

Available to Mac ISVs Worldwide SANTA CLARA, Calif. — May 15, 2002 — Macrovision Corporation (Nasdaq: MVSN), the world’s leading provider of digital rights management …

BOScom Launches First Fully Secure IP Telephony Gateways with Dynamic IP to PSTN Switching

Leicester, UK – 15th May, 2003 — IP Telephony specialists BOScom, of Leicester, has announced its new BOS??NOVA Claro family of IP Telephony products — the …

Handbook for Computer Security Incident Response Teams (CSIRTs)

The document is aimed at aiding the planning, creation and development of CSIRTs: teams trained specifically to deal with IT security incidents. One of the principal tasks of …

Meetinghouse and Intersil Enter into Licensing Agreement for AEGIS Authentication API Supporting WPA and Cisco CCX Wireless LAN Security

Agreement for Embedded Security Technology Exclusive to Meetinghouse PORTSMOUTH, NH, May 14, 2003 – Meetinghouse, a leading developer of standards-based network …

Trustix Answers Small Business Needs With Launch of First Linux-based Small Office Server

The most comprehensive offering for small business addresses all server-based applications plus unparalleled security London, UK / 14th May 2003 -Trustix (www.trustix.com), …

The Second Coming Of the “Lovgate” Worm

Kaspersky Labs, an international data security software developer, reports the detection of the five new modifications of the “Lovgate” Internet worm, first …

Linux Security: Public Key and Symmetric Key Encryption

This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Public Key Encryption In order to use public key …

Panda Antivirus Titanium: Awarded “Recommended Product” from BIT Portugal

Panda Software’s leading home-user solution receives yet more international acclaim MADRID, May 12 2003 BIT Portugal, one of the country’s leading IT magazines, …

Fizzer E-mail Worm is Spreading at an Alarming Rate

F-Secure is raising the alert to the highest level as Fizzer becomes one of the most widespread viruses currently in circulation. Fizzer was first seen on Thursday, 8th of …

Panda Software Receives Reports of Incidents Caused by Fizzer

– In the last few hours, this worm has reached 11th place in the list of viruses most frequently detected by Panda ActiveScan – This malicious code spreads rapidly …

Don't miss

Cybersecurity news