Help Net Security
Suspected Ganda Virus Author Questioned by Swedish Police
Sophos has today reported that according to commentary in the Swedish press, computer crime officers in Sweden have identified and questioned the suspected author of the Ganda …
Slammer, the Latest Worm to Follow in the Footsteps of Melissa
March 26 is the fourth anniversary of the appearance of Melissa, a macro virus for Word with worm-type characteristics, which caused one of the worst massive infections ever. …
Zix Corporation Selected by Blue Cross and Blue Shield of Kansas for Secure e-Messaging and Content Management before April HIPAA Deadline
ZixCorp will provide policy-driven content filtering and email encryption capability for staff, members and affiliates – protecting sensitive information sent via email …
PQRemove, Panda Software’s Free Tool for Combating the Most Dangerous Viruses
Apart from detecting and eliminating malicious code, this utility can repair the damage to systems caused by viruses PQRemove (Panda Quick Remover) is a utility that Panda …
New LovGate Worm Variant Intercepted
MessageLabs announced that yesterday a new version of LovGate worm was found in the wild. Initial research shows that this version of an infamous mass mailing worm …
Neoteris Closes $17.5 Million in Funding To Expand Instant, Secure Application Access Product Offerings
Battery Ventures Joins Existing Investors Jim Clark, The Barksdale Group, and NEA to Lead Series C Financing Round; Mark Sherman Joins Board of Directors MOUNTAIN VIEW, Calif. …
NEA Announces Investment in WholeSecurity; Company Addressing Serious Problem of Online Identity
Theft Jump to first matched term MENLO PARK, Calif.–(BUSINESS WIRE)–March 24, 2003–New Enterprise Associates (NEA) today announced that it will invest $3.4 …
Airscanner to Speak at Gobal Wireless Internet Forum
Airscanner Corporation, the technological leader in wireless security software, has been selected as a panel speaker at the Third Annual Global Wireless Internet Forum 2003. …
Managing the security of data flow
Customer Relationship Management (CRM) systems are cited as one of the major technology successes of the last decade. Although these ‘super databases’ enable the …
Wave of Digital Retaliation as War Starts
London, UK, 12:30 GMT 21 March 2003 – US, UK, Australian and South Korean online business interests have come under heavy digital attack over the last 24 hours. The …
ActivCard Selected by Northrop Grumman IT to Provide Identity Management
For U.S. Common Access Card Program ActivCard Will Deliver New ActivCard Gold for CAC PKI 3.0 to the U.S. Army Set-D With Advanced Management Capabilities, Enabling Reduced …
Weekly Virus Report: Axatak, Ganda.A, Bibrog.C and Lentin.Q Worms
This week’s virus report will look at four worms: Axatak, Ganda.A, Bibrog.C and Lentin.Q. Axatak uses any of the usual means of transmission employed by worms to spread …
Featured news
Sponsored
Don't miss
- NIST is chipping away at NVD backlog
- FBI confirms China-linked cyber espionage involving breached telecom providers
- How a Windows zero-day was exploited in the wild for months (CVE-2024-43451)
- How Intel is making open source accessible to all developers
- Zero-days dominate top frequently exploited vulnerabilities