Please turn on your JavaScript for this page to function normally.
VSpace CSA Goes Solo – Launches New Corporate Security System

Michael Vaughn, former Chief Software Architect for VSpace, Inc., announces the release of a new high-end secure application for American Corporate use to aide in their …

Unix Shell Scripting Malware

Article by: Marius van Oers, McAfee AVERT, The Netherlands Courtesy of Virus Bulletin Unix/Linux binary malware can be very dependent upon distribution flavour and kernel …

Security in Plan 9

The security architecture of the Plan 9 operating system has recently been redesigned to address some technical shortcomings. This redesign provided an opportunity also to …

Secos And Security Focus Partner To Deliver Real-Time Vulnerability Data

Irvine, CA – July 25, 2002- Secos, dedicated to the development of globally focused technology, offering network, transaction, content, and system security, today …

Panda Software’s Perimeterscan Released

Panda Software, international antivirus software developer, has released the beta version of Panda PerimeterScan ISA Server Edition. ISA Server is one of the most widely-used …

Resilience DX4000 Integrated High Availability Security Appliance Achieves “Secured by Check Point” Certification

New Resilience VPN/Security Appliance Delivers Unsurpassed Price/Performance Sunnyvale, CA – July 22, 2002 – Resilience Corporation, the leading provider of …

Symantec’s Norton AntiVirus 2002 Wins Editors’ Choice in CNET Roundup

Norton AntiVirus Bests Field of 10 to be Named ‘Best in the Biz’ CUPERTINO, Calif. – July 23, 2002 – Symantec Corp. (Nasdaq: SYMC), the world leader in …

ISA Server Now Protected by Panda Software’s Perimeterscan

Panda Software, international antivirus software developer, has released the beta version of Panda PerimeterScan ISA Server Edition. ISA Server is one of the most widely-used …

Trusted Paths for Browsers: An Open-Source Solution to Web Spoofing

This paper reports the results of our work to systematically defend against Web spoofing, by creating a trusted path from the browser to the user. Starting with the Mozilla …

BitDefender Adds a Privacy Control Module to BitDefender Professional

Bucharest, Romania – July 21, 2002 – Following several international organizations’ warnings against the frequent invasions of privacy, BitDefender, a …

Datakey Announces Second Quarter Results

Second Quarter Revenues Increase 77 Percent Over Last Year MINNEAPOLIS, July 23, 2002 – Datakey Inc. Nasdaq: DKEY, a leading developer of smart card technology for …

Secure Execution Via Program Shepherding

We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. Program shepherding provides three …

Don't miss

Cybersecurity news