Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The Palyh Worm Appears as A Communique From Microsoft

Kaspersky Labs, an international data security software developer, reports the detection of a new network worm named “Palyh”, which is spreading via email and …

Palyh Worm Disguised as Microsoft Email

Sophos, a global leader in anti-virus protection for businesses, has warned that a new email-aware worm is spreading, disguised as an email appearing to come from …

TCP/IP Bible

TCP/IP is the protocol suite that runs almost every network environment today. Consequently there are tons of books about TCP/IP - some deal with network implementation …

Weekly Virus Report – Fizzer Worm and Lovgate Variants

This week’s virus report looks at Trifor (Trj/Trifor), the dangerous Fizzer worm (W32/Fizzer), and the I, J, K, L and M variants of the Lovgate worm. Trifor is a Trojan …

Flaw in Fizzer’s Code Provides Vital Hint of Infection

The Fizzer worm (W32/Fizzer-A), which has this week spread via email, file-sharing networks and internet relay chat, has been found by Sophos researchers to contain a bug …

Macrovision Launches SafeDisc Copy-Protection for Mac OS X

Available to Mac ISVs Worldwide SANTA CLARA, Calif. — May 15, 2002 — Macrovision Corporation (Nasdaq: MVSN), the world’s leading provider of digital rights management …

BOScom Launches First Fully Secure IP Telephony Gateways with Dynamic IP to PSTN Switching

Leicester, UK – 15th May, 2003 — IP Telephony specialists BOScom, of Leicester, has announced its new BOS??NOVA Claro family of IP Telephony products — the …

Handbook for Computer Security Incident Response Teams (CSIRTs)

The document is aimed at aiding the planning, creation and development of CSIRTs: teams trained specifically to deal with IT security incidents. One of the principal tasks of …

Meetinghouse and Intersil Enter into Licensing Agreement for AEGIS Authentication API Supporting WPA and Cisco CCX Wireless LAN Security

Agreement for Embedded Security Technology Exclusive to Meetinghouse PORTSMOUTH, NH, May 14, 2003 – Meetinghouse, a leading developer of standards-based network …

Trustix Answers Small Business Needs With Launch of First Linux-based Small Office Server

The most comprehensive offering for small business addresses all server-based applications plus unparalleled security London, UK / 14th May 2003 -Trustix (www.trustix.com), …

The Second Coming Of the “Lovgate” Worm

Kaspersky Labs, an international data security software developer, reports the detection of the five new modifications of the “Lovgate” Internet worm, first …

Linux Security: Public Key and Symmetric Key Encryption

This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Public Key Encryption In order to use public key …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools