Help Net Security
The Windows XP/2000 Answer Book: A Complete Resource from the Desktop to the Enterprise
The examples in this book are organized very well for easy access. This is a perfect reference guide both for system administrators and home users that want to solve problems …
Weeky Virus Report – Palyh, Petik, Melare and Redisto Worms
This week’s report looks at four worms: Palyh (W32/Palyh or Sobig.B), Petik.N (VBS/Petik.N), Melare (W32/Melare) and Redisto (W32/Redisto). Palyh (also known as Sobig.B) …
Tumbleweed Releases Anti-Spam Service Built for Business
Initial Customers Report High Spam Capture Rates And Low False Positives While Preserving Legitimate Business Communications Redwood City, CA – MAY 22, 2003 – …
Trojan Uses Internet Explorer “Exploit.SelfExecHtml” Vulnerability
Kaspersky Labs, an international data security software developer, reports the appearance of the Trojan program, ‘StartPage’ – the first malware to infect …
Royal College of General Practitioners Chooses Trustix Linux Solutions to Help Keep GPs Informed
London, UK – 22nd May 2003 – The Royal College of General Practitioners (RCGP) has chosen Trustix and IBM to supply a Linux based e-mail server solution to support …
Palyh Worm Problems Could Easily Have Been Avoided
One frequently ignored aspect of corporate antivirus protection is the built-in file filtering facilities that such protection normally includes, and which represents a …
Cisco Extends Leadership in Integrated Network Security
New management, performance, and scalability extensions enhance and protect business productivity SAN JOSE, Calif., May 20, 2003 – Cisco Systems, Inc. today announced 14 …
Matrix Hacking – A Slice of Reality in a World of Make Believe
It might be all make believe, but the film – The Matrix: Reloaded – has opted for reality in one of its most important scenes, the hacking of the computer that …
Sophos Offers Free Web Updates To Protect Journalists From Computer Viruses
Sophos, a global leader in anti-virus protection for businesses, is offering freelance and home-office based journalists free anti-virus software which can be easily …
BASEL II: Everyone is in the Risk Business Now
Managing risk used to be straightforward process, but all that is about to change for the world’s central banks and their IT departments. Basel II, the accord which …
Intrusion Inc. Doubles Performance of Two Most Popular IDS Sensors
RICHARDSON, Texas–(BUSINESS WIRE)–May 20, 2003– Intrusion Inc. Leads in Price/Performance with Double the Performance and New Lower Prices for the Two Most …
PC-Duo Enterprise Remote Control v8 Provides Flexible Encryption
New remote control module of PC-Duo Enterprise adds flexibility for increased performance and security Tamworth, Staffordshire, UK – 20th May 2003 – Vector …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025