Please turn on your JavaScript for this page to function normally.
Hacker Attacks Possible as E-mail Worm Disables Antivirus Programs and Firewalls

Panda Software’s Virus Laboratory today reported a new e-mail worm “Bugbear” that attacks files used by antivirus programs and firewalls. Once this worm has …

SSH Communications Security Corp Partners With nCipher To Ensure Enterprises And Service Providers Safe Storage Of Private Keys

Strong and easily manageable PKI solution for CA’s to safeguardcertificate signing keysHELSINKI, FINLAND – October 1, 2002 – SSH Communications …

Sophos Suggestions for Taking Care of Bugbear

Worm Sophos Anti-Virus, a world leader in corporate anti-virus protection, isadvising IT managers to be on the lookout for the new Bugbear worm(W32/Bugbear-A), which is …

New Release: MailScanner 3.23-4 for Linux

MailScanner is a virus scanner for e-mail designed for use on e-mail gateways. It can also detect a large proportion of unsolicited commercial e-mail (spam) passing through …

Kyberpass Launches Next Generation TrustPlatform

Kyberpass first to combine Web Services and Secure SSL VPNs for global B2B integration and offers free plug-ins for secure e-mail, digital signatures and extranets OTTAWA, …

Datakey Smart Card Technology Deployed by U.S. Government Agency

15,000 employees will lock-down their laptops with Datakey smart cards to secure sensitive documents MINNEAPOLIS, Sept. 30, 2002 – Datakey Inc. (Nasdaq: DKEY; …

Hurwitz Group Calls TruSecure “A Holistic Approach To Security”

White Paper Examines TruSecure’s Lifecycle Risk Management (LRM) Approach to Securing Information Assets TruSecure Corporation, a leading security services provider, …

Highlights of Utimaco Safeware for the ISSE 2002 (October 2-4, 2002, Paris)

SecurE-Mail Gateway Secure electronic Post Office for Organizations and Authorities The SecurE-Mail Gateway is a new technology platform for e-mail security. As …

Weekly Virus Report – Look at 3 Trojans and 2 Slapper Versions

This week’s virus report looks at three Trojans and two variants of Linux/Slapper The first Trojan we will refer to today is Bck/RBackdoor, which, by default, opens …

Distributed Team Collaborates to Solve Secret-Key Challenge

Contest designed to keep the cryptographic community updated on new achievements and help organizations maintain highest levels of security Bedford, MA, Thursday, September …

Panda Software reports on Inwi Trojan

Panda Software’s Virus Laboratory has reported a new Trojan called Inwi (Trj/Inwi). This malicious code is designed to steal information from the computers in which it …

Tricks Used by Viruses to Lure Young Computer Users

By taking advantage of the popularity of the Internet among young users, virus programmers are making use of lures such as videogames and free screensavers to trick careless …

Don't miss

Cybersecurity news