Please turn on your JavaScript for this page to function normally.
Threat Profiling Microsoft SQL Server

This paper is written from the perspective of an attacker and shows typical “cursi incursi” for Microsoft SQL Server. An attacker’s location in the …

Sophos Anti-Virus Receives West Coast Checkmark

Sophos Anti-Virus receives West Coast Checkmark for 100% detection of in-the-wild viruses yet again Sophos announced today that its flagship product, Sophos Anti-Virus, has …

SSL – A discussion of the secure socket layer

The Secure Socket Layer is the protocol that gives e-commerce the confidence it needs to allow on-line banking and shopping. SSL provides and encrypted bi-directional data …

Panda Software Now Compatible with Citrix Metaframe 1.8

Panda Software, leading international antivirus developer, has announced the compatibility of its antivirus for NT and 2000 file servers with the Citrix Metaframe 1.8 …

IDC Confirms Trend Micro is Worldwide Leader in Server-Based Antivirus Software Market for Second Consecutive Year

Trend Micro grows fastest worldwide among top three antivirus vendors at 31% year over year Cupertino, CA, August 30, 2002 – According to a recently published report …

Kaspersky Labs: Virus Top 20 for August 2002

Kaspersky Labs presents the latest top-20 list of the most wide-spread malicious programs in August 2002. The numbers represent the percentage of infections caused by certain …

Sophos: Top 10 Viruses and Hoaxes in August 2002

This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses and hoaxes as compiled by Sophos, a world leader in corporate …

Central Command: Top 12 Viruses For August 2002

W32/Yaha.E Dethrones Worm/Klez.E Taking Top Spot, KaZaa And Other File-Sharing Users Still At Risk Central Command, a leading provider of PC anti-virus software and computer …

Monitored Intrusion Detection Systems

Most enterprise networks are protected from the Internet by firewalls. While firewall protections are essential, they rarely identify types of attacks, or attacks on allowed …

Secure Personal Identification Systems: Policy, Process and Technology Choices for a Privacy-Sensitive Solution

This paper describes policy, process and technology issues that need to be considered in implementing a privacy-sensitive secure personal ID system. The different ID …

Activcard Provides The “Smarts” In One Million Common Access Cards Issued By The U.S. Department Of Defense

FREMONT, Calif. – August 28, 2002 — ActivCard® (Nasdaq: ACTI/Nasdaq Europe: ACTI), a leader in identity management and strong authentication solutions, announced …

Shatter attacks – more techniques, more detail, more juicy goodness.

Introduction Well, It’s now two weeks since the release of Shatter, and my inbox has finally started calming down. I’ve tried to reply to most of the messages …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools