Help Net Security
VSpace CSA Goes Solo – Launches New Corporate Security System
Michael Vaughn, former Chief Software Architect for VSpace, Inc., announces the release of a new high-end secure application for American Corporate use to aide in their …
Unix Shell Scripting Malware
Article by: Marius van Oers, McAfee AVERT, The Netherlands Courtesy of Virus Bulletin Unix/Linux binary malware can be very dependent upon distribution flavour and kernel …
Security in Plan 9
The security architecture of the Plan 9 operating system has recently been redesigned to address some technical shortcomings. This redesign provided an opportunity also to …
Secos And Security Focus Partner To Deliver Real-Time Vulnerability Data
Irvine, CA – July 25, 2002- Secos, dedicated to the development of globally focused technology, offering network, transaction, content, and system security, today …
Panda Software’s Perimeterscan Released
Panda Software, international antivirus software developer, has released the beta version of Panda PerimeterScan ISA Server Edition. ISA Server is one of the most widely-used …
Resilience DX4000 Integrated High Availability Security Appliance Achieves “Secured by Check Point” Certification
New Resilience VPN/Security Appliance Delivers Unsurpassed Price/Performance Sunnyvale, CA – July 22, 2002 – Resilience Corporation, the leading provider of …
Symantec’s Norton AntiVirus 2002 Wins Editors’ Choice in CNET Roundup
Norton AntiVirus Bests Field of 10 to be Named ‘Best in the Biz’ CUPERTINO, Calif. – July 23, 2002 – Symantec Corp. (Nasdaq: SYMC), the world leader in …
ISA Server Now Protected by Panda Software’s Perimeterscan
Panda Software, international antivirus software developer, has released the beta version of Panda PerimeterScan ISA Server Edition. ISA Server is one of the most widely-used …
Trusted Paths for Browsers: An Open-Source Solution to Web Spoofing
This paper reports the results of our work to systematically defend against Web spoofing, by creating a trusted path from the browser to the user. Starting with the Mozilla …
BitDefender Adds a Privacy Control Module to BitDefender Professional
Bucharest, Romania – July 21, 2002 – Following several international organizations’ warnings against the frequent invasions of privacy, BitDefender, a …
Datakey Announces Second Quarter Results
Second Quarter Revenues Increase 77 Percent Over Last Year MINNEAPOLIS, July 23, 2002 – Datakey Inc. Nasdaq: DKEY, a leading developer of smart card technology for …
Secure Execution Via Program Shepherding
We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. Program shepherding provides three …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on