Help Net Security
Kaspersky Labs: Virus Top 20 for August 2002
Kaspersky Labs presents the latest top-20 list of the most wide-spread malicious programs in August 2002. The numbers represent the percentage of infections caused by certain …
Sophos: Top 10 Viruses and Hoaxes in August 2002
This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses and hoaxes as compiled by Sophos, a world leader in corporate …
Central Command: Top 12 Viruses For August 2002
W32/Yaha.E Dethrones Worm/Klez.E Taking Top Spot, KaZaa And Other File-Sharing Users Still At Risk Central Command, a leading provider of PC anti-virus software and computer …
Monitored Intrusion Detection Systems
Most enterprise networks are protected from the Internet by firewalls. While firewall protections are essential, they rarely identify types of attacks, or attacks on allowed …
Secure Personal Identification Systems: Policy, Process and Technology Choices for a Privacy-Sensitive Solution
This paper describes policy, process and technology issues that need to be considered in implementing a privacy-sensitive secure personal ID system. The different ID …
Activcard Provides The “Smarts” In One Million Common Access Cards Issued By The U.S. Department Of Defense
FREMONT, Calif. – August 28, 2002 — ActivCard® (Nasdaq: ACTI/Nasdaq Europe: ACTI), a leader in identity management and strong authentication solutions, announced …
Shatter attacks – more techniques, more detail, more juicy goodness.
Introduction Well, It’s now two weeks since the release of Shatter, and my inbox has finally started calming down. I’ve tried to reply to most of the messages …
Panda Software and Sabre converge on Computer Security for Latin America Travel Agents
In an effort to increase computer security across the Latin American travel industry, today Panda Antivirus Software and Sabre Holdings Corporation announced a joint strategy: …
DuLoad Provides Sad Snapshot Of Virus Writer Psyche
The DuLoad worm (W32/Duload-A), which has the potential to infect PCs connected to the KaZaA file sharing network, may be a damp squib when it comes to infecting users, but it …
Check Point Software First to Secure Web Services
XML/SOAP security made possible with Breakthrough Application Intelligence Technology REDWOOD CITY, Calif., Aug. 27, 2002 – Check Point Software Technologies Ltd. …
RSA Conference Proves Security is IT’s Hottest Topic
BRACKNELL, UK, August 27, 2002 — Organisers of the RSA® Conference 2002, Europe today confirmed that registrations for the event have reached unprecedented levels, and also …
Public Key Infrastructure (PKI): A Primer
As the Internet becomes an increasingly important means of conducting transactions and the volume of e-business grows exponentially, a secure infrastructure is needed to …
Featured news
Resources
Don't miss
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)
- Acrobat Reader zero-day exploited in the wild for many months
- AI agent intent is a starting point, not a security strategy