Help Net Security
Internet Virus Alert: Central Command Warns Of New RPC Computer Worm Named Worm/Lovsan.A
New Internet worm exploiting the known RPC Buffer Overrun vulnerability gains momentum MEDINA, Ohio August 11, 2003 – Central Command, a leading provider of PC …
Blaster Worm Exploits Microsoft Security Hole And Launches Attack On Update Website, Warns Sophos
Sophos is warning computer users of a new worm spreading across the internet, which exploits a critical vulnerability in versions of Microsoft Windows. The W32/Blaster-A worm …
Panda Software Alerts on New Worm W32/Blaster
– It has been created to exploit the new vulnerability discovered in several versions of Microsoft Windows – Panda Software has started receiving incidents caused …
(ISC)2 and VCampus to Offer Online Information Security Training
Web-Based Curriculum to Address Growing Demand for Certified Information Security Professionals in Business and Government VIENNA, Virginia, U.S.A., Aug. 11, 2003 – The …
Tumbleweed and FaceTime Communications Form Alliance to Deliver Comprehensive Messaging Solution
Partnership Combines Tumbleweed’s E-mail Firewall with FaceTime’s Instant Messaging (IM) Security Solutions to Seamlessly Protect and Manage Multiple Channels of …
Bell Canada and Aventail Partner to Deliver Secure Enterprise-Grade Managed Remote Access Service
Secure Virtual Private Network technology helps Canadian enterprises extend simple remote access to a broader range of locations, devices, and network resources Seattle, WA …
Zone Labs Expands Endpoint Security Protection with Acquisition of Instant Messaging Security Company
Zone Labs Now Secures the Latest Threat to Internet Security and the Endpoint PC – Instant Messaging San Francisco, CA. – August 12, 2003 – Zone Labsr Inc., …
Spending on Intrusion Detection Alone is a Waste
Interxion Responds To Meta Group Predictions The META Group’s prediction that spending on Intrusion Detection (ID) technology is set to increase (1) is undoubtedly a …
The Present and Future of Xprobe2 – The Next Generation of Active Operating System Fingerprinting
Although some advancement was made in the field of active operating system fingerprinting in the recent years, still, there are many issues to resolve. This paper presents the …
AirDefense Identifies New WLAN Denial-of-Service Attack, Investigating Potential Threats
AirDefense Monitors WLAN Traffic at DefCon, Adds New Attack Signature Las Vegas- August 7, 2003 – After monitoring wireless LAN traffic at last weekend’s DefCon …
Revenues from Global Enterprise Investment in Security Products Predicted to Hit $13.5bn by 2006
London, 8 August 2003 – Increased interest in security solutions amongst enterprises globally has ensured that security product revenues have exceeded those of many …
Weekly Virus Report – Autorroter Trojan, Panol and Mimail Worms
This week’s report looks at a Trojan called Autorooter and two worms, Panol and Mimail. Autorooter is a Trojan that uses a vulnerability exploit known as DCOM-RPC. …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)