Please turn on your JavaScript for this page to function normally.
The Advantages of Block-Based Protocol Analysis for Security Testing

This paper describes a effective method for black-box testing of unknown or arbitrarily complex network protocols for common problems relating to the security of a program or …

Trend Micro Announces Q4 2002 Earnings

Trend Micro, a worldwide leader in network antivirus and Internet content security solutions, today announced Q4 2002 earnings – posting a group net profit of Y7.89 …

iPass Improves its Enterprise Connectivity Offerings For PDA Devices and Mac OS X

LONDON, UK – Building upon its virtual network operator capabilities and experience in delivering enterprise connectivity services across multiple network technologies, …

BBC’s The Archers Sends Out Virus

The BBC has confirmed that subscribers to its email newsletter about The Archers, the world’s longest running radio serial, were accidentally sent the Sobig worm. The …

Datakey Introduces Model 330J Java Card

The Model 330J delivers multi-application capability and broad interoperability with the complete list of standard security applications currently supported by Datakey CIP …

Kaspersky Labs: Virus Top 20 for January 2003

The percentage shown represents the percentage of registered incidences. 1 I-Worm.Klez 16.65% 2 I-Worm.Lentin 8.75% 3 I-Worm.Sobig 6.57% 4 I-Worm.Avron 6.55% 5 …

Klez.I heads Panda ActiveScan’s Top Ten

January was the ninth month that saw the “I” variant of the Klez as the malicious code responsible for most attacks on users’ computers, according to the …

Equipped with Arbor Networks’ Peakflow, Rackspace Managed Hosting Staves Off SQL Worm

Leading hosting provider uses Arbor’s network anomaly detection to proactively protect its network and customers 31st January 2003 – Arbor Networks(tm), a leading …

Weekly Virus Report – SQLSlammer, Netspree Worms and Winpao Trojan

The attack launched by SQLSlammer is considered to be the one that has had the biggest impact on the Internet over the last 18 months. This worm exploits a vulnerability in …

Sophos: Top 10 Viruses and Hoaxes in January 2003

This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses and hoaxes as compiled by Sophos, a world leader in corporate …

Compass Security Finjan SurfinGate Analysis

HTTP content filter technique promises protection at your perimeter infrastructure. While penetrating the clients’ infrastructure during a pen-test job, we are ready to …

Diversinet Granted Patent for Preventing Online Authentication System Downtime in the Event of an Attack

TORONTO, Canada, January 30, 2003 – Diversinet Corp. (NASDAQ Small Cap: DVNTD), a leading provider of secured mobile solutions, today announced that it has been granted …

Don't miss

Cybersecurity news