Help Net Security
Black Hat Briefings 2002 Keynotes Include NSA Director And Special Advisor To The President
NSA Security Evaluations Group Technical Director Richard George & Richard Clarke – Special Advisor to the President for Cyberspace Security …
New Panda PerimeterScan Qmail Edition Released
Panda Software antivirus solutions for Linux platforms Panda Software, leading antivirus software developer, has released the new beta version of Panda PerimeterScan Qmail …
Microsoft SQL Server Passwords (Cracking the password hashes)
SQL Server uses an undocumented function, pwdencrypt() to produce a hash of the user’s password, which is stored in the sysxlogins table of the master database. This is …
Benjamin Worm Gets a “B” Version
Virus analyzed by: Bogdan Dragu BitDefender Virus Researcher http://www.bitdefender.com Name: Win32.Worm.Benjamin.B Aliases: Worm.Kazaa.Benjamion (KAV) Type: Executable Worm …
RSA Security Embraces SAML Standard Across Product Lines
RSA Security demonstrates SAML functionality with RSA ClearTrust® software at the Burton Group Catalyst Conference in San Francisco on July 15 BEDFORD, Mass., July 9, 2002 — …
GFI Launches Email Exploit Engine – New Technology To Block Email Threats
A revolutionary way of protecting networks against current and future email attacks London, UK, 10 July 2002 – GFI MailSecurity for Exchange/SMTP, GFI’s new email …
McAfee.com Reaches Two Million Subscription Milestone
New SecurityCenter and Product Momentum Credited With Boosting Subscriptions SUNNYVALE, Calif., July 10 /PRNewswire-FirstCall/ — McAfee.com (Nasdaq: MCAF), a leading …
Rainbow Ships NetSwift iGate Web Security Appliance for Instant Private Webs
First Integrated Security Solution for Secure Access to Web-enabled Applications Without Reconfiguring Backend Servers, Firewalls or Mission-Critical Applications IRVINE, …
Major U.S. bank deploying Datakey’s new Card Management System
MINNEAPOLIS, July 9, 2002 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a trusted developer of smart card solutions for securing enterprise-wide personal …
Security in Open versus Closed Systems – The Dance of Boltzmann, Coase and Moore
Some members of the open-source and free software community argue that their code is more secure, because vulnerabilities are easier for users to find and fix. Meanwhile the …
Panda Software: Klez.I Leads the Top Ten List
In June and for the third month running, Klez.I tops the list of the most virulent malicious code, compiled from the results of the free online virus scanner, Panda …
Etap Author Tells Us The Score
I am The Mental Driller, member of the 29A virus-writing group. My reason for writing is that I wish to deny publicly that the virus ‘Simile’, or …