Please turn on your JavaScript for this page to function normally.
Privador and Ip Solutions Conclude Agreement to Start Co-Marketing and Co-Developing Activities

2002-04-10 Estonian information security company Privador and Danish IT security company Ip Solutions have concluded an agreement for conducting joint activities in marketing …

Network-1’s CyberwallPLUS Receives Recommended Award From SC Magazine

Ease-of-use and Installation; Noteworthy Packet Filter Engine; Impressive Intrusion Detection Cited WALTHAM, Mass., Apr 11, 2002 (BUSINESS WIRE) — Network-1 Security …

Bull Evidian’s Portalxpert 3.1 Delivers Universal And Instant Web Security For The Extended Enterprise

With PortalXpert 3.1, Bull Evidian helps corporations rapidly build secure, user-friendly B2E, B2B and B2C infrastructures. Paris, April 12, 2002: Bull Evidian, the secure …

Sophos Helps Teachers And Pupils Get Top Marks For Virus Protection

UK anti-virus vendor produces guidelines for safe computing in the classroom Sophos, a world leader in anti-virus protection, has today released a series of information packs …

United Messaging Deploys Trend Micro Solutions for Its Managed Exchange Service Subscribers

Trend Micro(TM) ScanMail(TM) for Microsoft(R) Exchange 2000 Provides Managed Virus Protection; Secures and Defends Against Security Threats CUPERTINO, Calif and MALVERN, Penn. …

Cogient Corp Clients are Secure through E-Certify’s Secure Web Application Portal

Toronto, ON April 5, 2002 – E-Certify announced today that an agreement has been signed with Cogient Corp., a healthcare application service provider, to supply the …

McAfee.com Acquires Leading Anti-Spam Technology to Attack Fast Growing Internet Problem

‘SpamKiller’ Creator and Anti-Spam Expert to Join Company SUNNYVALE, Calif., April 10 /PRNewswire-FirstCall/ — McAfee.com (Nasdaq: MCAF), a leading provider …

Know Your Enemy: Passive Fingerprinting

This paper details how to passively learn about the enemy, without them knowing about it. Specifically, how to determine the operating system of a remote host using passive …

Know Your Enemy: Worms at War

See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …

Know Your Enemy: Motives

This paper studies the motives and psychology of the black-hat community, in their own words. Read the paper in HTML format here.

Know Your Enemy: A Forensics Analysis

This paper studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we focus on our analysis techniques and how we …

Know Your Enemy: III

What happens after the script kiddie gains root. Specifically, how they cover their tracks while they monitor your system. The paper goes through step by step on a system that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools