Help Net Security
USAF Selects PureEdge To Provide Secure XML Information Management Tools
PureEdge Awarded $6.67 Million Multi-Year Contract To Modernize e-forms VICTORIA, BRITISH COLUMBIA — 11/18/2002 — PureEdge Solutions Inc., the leading provider of …
TruSecure Names John Becker Chairman and CEO
Former CEO and President of AXENT Technologies, Industry Veteran To Lead TruSecure to Next Level of Growth HERNDON, Va.–November 18, 2002–TruSecure(R) Corporation, …
Qualys Introduces Per-Scan Pricing for Vulnerability Assessment
Qualys Provides User Flexibility and Cost Savings by Offering Customers Pay-Per-Scan Pricing CSI Conference — Chicago – November 12, 2002 – Qualysâ„?, Inc., …
Trend Micro Announces PC-cillin 2003
All-in-One Antivirus, Personal Firewall & Wireless Offering Provides Enterprise-Level Protection at an Affordable Price for Consumers and SOHO Customers Cupertino, CA …
Security holes… Who cares?
We report on an observational study of user response following the OpenSSL remote buffer overflows of July 2002 and the worm that exploited it in September 2002. Immediately …
Spoofing – Arts of attack and defense
How to spot and avoid potential spoof atacks. Covers DNS spoofing, IP address spoofing, email address spoofing, link alteration, name similarity and content theft. Download …
Explaining Encryption
Make any enquiry about computer security, and you will almost immediately fall over the terms cryptography and encryption (and also decryption), but what exactly is meant by …
How do you deal with Internet fraud?
This paper covers fraud that uses Internet technology as an integral part of the fraud and fraud that is already taking place by other means where the Internet is merely …
Norman Virus Control Receives Virus Bulletin 100% Award
The data security company Norman ASA has received yet another Virus Bulletin 100% Award. This signifies that Norman Virus Control (NVC) found 100% of the viruses reported to …
Baltimore secures DigiNotar’s ‘DigiOverheid’ Service for Issuing Digital Certificates to End Users in the Netherlands
Amsterdam, November 12, 2002: Baltimore Technologies (London: BLM), a global leader in e-security, and DigiNotar, a Dutch Trusted Third Party (TTP) using Baltimore’s …
Creator of Gokar and Redesi Worms Faces Charges
A web designer from Llandudno, North Wales, has appeared in court in connection with creating and distributing three mass-mailing computer viruses: Gokar, Redesi and Admirer. …
The changing face of web security
Are we winning or losing the battle of web security? Read this white paper backed by industry figures to ensure you are aware of the facts. Download the paper in PDF format here.
Featured news
Resources
Don't miss
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
- New framework aims to outsmart malware evasion tricks
- Finding connection and resilience as a CISO
- AI isn’t taking over the world, but here’s what you should worry about
- Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations