Help Net Security
Unix Shell Scripting Malware
Article by: Marius van Oers, McAfee AVERT, The Netherlands Courtesy of Virus Bulletin Unix/Linux binary malware can be very dependent upon distribution flavour and kernel …
Security in Plan 9
The security architecture of the Plan 9 operating system has recently been redesigned to address some technical shortcomings. This redesign provided an opportunity also to …
Secos And Security Focus Partner To Deliver Real-Time Vulnerability Data
Irvine, CA – July 25, 2002- Secos, dedicated to the development of globally focused technology, offering network, transaction, content, and system security, today …
Panda Software’s Perimeterscan Released
Panda Software, international antivirus software developer, has released the beta version of Panda PerimeterScan ISA Server Edition. ISA Server is one of the most widely-used …
Resilience DX4000 Integrated High Availability Security Appliance Achieves “Secured by Check Point” Certification
New Resilience VPN/Security Appliance Delivers Unsurpassed Price/Performance Sunnyvale, CA – July 22, 2002 – Resilience Corporation, the leading provider of …
Symantec’s Norton AntiVirus 2002 Wins Editors’ Choice in CNET Roundup
Norton AntiVirus Bests Field of 10 to be Named ‘Best in the Biz’ CUPERTINO, Calif. – July 23, 2002 – Symantec Corp. (Nasdaq: SYMC), the world leader in …
ISA Server Now Protected by Panda Software’s Perimeterscan
Panda Software, international antivirus software developer, has released the beta version of Panda PerimeterScan ISA Server Edition. ISA Server is one of the most widely-used …
Trusted Paths for Browsers: An Open-Source Solution to Web Spoofing
This paper reports the results of our work to systematically defend against Web spoofing, by creating a trusted path from the browser to the user. Starting with the Mozilla …
BitDefender Adds a Privacy Control Module to BitDefender Professional
Bucharest, Romania – July 21, 2002 – Following several international organizations’ warnings against the frequent invasions of privacy, BitDefender, a …
Datakey Announces Second Quarter Results
Second Quarter Revenues Increase 77 Percent Over Last Year MINNEAPOLIS, July 23, 2002 – Datakey Inc. Nasdaq: DKEY, a leading developer of smart card technology for …
Secure Execution Via Program Shepherding
We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. Program shepherding provides three …
Panda Antivirus for Novell Netware 6 Beta Released
Panda Antivirus for Novell Netware 6 seamlessly integrates the most sophisticated antivirus technology with the latest version of Novell’s networking tool. The solution …
Featured news
Resources
Don't miss
- A humble proposal: The InfoSec CIA triad should be expanded
- Rsync vulnerabilities allow remote code execution on servers, patch quickly!
- Contextal Platform: Open-source threat detection and intelligence
- Using cognitive diversity for stronger, smarter cyber defense
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws