Search results for: software

Network Associates Acquires Deersoft Anti-Spam Technology

Network Associates, Inc. acquired Deersoft, Inc., a provider of anti-spam applications. The Deersoft acquisition is the first in a series of investments Network Associates is making in spam and content filtering technologies. Under the terms of the deal, Network Associates has acquired technologies associated with Deersoft’s consumer and enterprise anti-spam products for an undisclosed amount and will assume all support obligations for Deersoft customers. The technology will be delivered at the gateway, email server and … More

Linux Security: Reflections on 2002

Here are my reflections on Linux security in 2002 and predictions for 2003. All statements not otherwise attributed are my opinions. I think that the major change in 2002 over 2001 in Linux security was that major heavily-deployed subsystems continued to get more hardened. The recent versions of Sendmail, LPD (Line Printer Daemon), and the commercial ( version of SSH suffered no vulnerabilities. This may be a record for these subsystems. Non-Windows Apache did suffer … More

Norman Warns Of A New Variant Of Fast Spreading Email Worm

The Data Security Company Norman warns against a new variant of the mass mailer worm, W32/Yaha. W32/Yaha.K comes in what appears to be an ordinary e-mail, and spreads through normal e-mail channels. The worm uses a large variety of different subject lines, body texts and attachment names, full details of which can be found at The worm will copy itself to certain directories in the Windows system, and then make changes to the Registry … More

Central Command: Top 12 Viruses For December 2002

Central Command Releases Its Dirty Dozen – Top 12 – Viruses For December 2002 Alterations In Worm/Klez.E Subject Lines Allows For Continued Propagation, W32/Yaha.M Breaks-In At Number Ten MEDINA, Ohio December 31, 2002 – Central Command, a leading provider of PC anti-virus software and computer security services today released its monthly listing of the top twelve viruses reported for December 2002. The report, coined the “Dirty Dozen”, is based on the number of virus occurrences … More

Sophos: Top 10 Viruses and Hoaxes in December 2002

This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses and hoaxes as compiled by Sophos, a world leader in corporate anti-virus protection. For December 2002, the virus chart is as follows, with the most frequently occurring virus at number one: 1. W32/Bugbear-A (Bugbear worm) 15.8% THIRD MONTH AT NUMBER ONE 2. W32/Klez-H (Klez variant) 10.9% ELEVENTH MONTH IN TOP TEN 3. Troj/Tubmo-A (Tubmo Trojan) 5.9% NEW … More

The Ten Most Dangerous Viruses of 2002

Panda Software, leading antivirus software developer, has published a list of the ten most prevalent viruses in 2002 based on the data compiled from Panda ActiveScan, the free, online antivirus. There’s no doubt that this year’s most virulent malicious code has been Klez.I, responsible for nearly 18 percent of all infections. This ruthless virus uses a two-pronged attack. On the one hand using ‘social-engineering’ under a multitude of guises, to trick users, and on the … More

“L” Variant of the Opaserv Worm Circulating Around

This worm has been designed to activate on or after December 24 2002 . Its actions include deleting the contents of the infected computer’s CMOS and hard disk Panda Software’s Virus Laboratory has detected the appearance of Opaserv.L (W32/Opaserv.L). This new variant is particularly dangerous as, on December 24, 2002 or afterwards, it can delete the CMOS memory and every file in the infected computer’s hard disk. Opaserv.L spreads over the Internet, in search of … More

The Position of Sophos in the Anti-Virus World

Sophos is the world’s 5th largest and the biggest European-headquartered anti-virus vendor. On the term of profitability, Sophos takes the third place, just after Symantec and Trend Micro. Sophos’s increasingly rapid growth internationally is reflected in a user base of well over 20 million and revenues, which soared by nearly 40% in the year 2001-2002. While attending the RSA Conference 2003, we had an opportunity to talk with Michel Lanaspèze, Manager of Marketing and Communication … More

Security Year in Review by Mark Finan

Mark Finan is the Marketing Manager at Attix5 UK. Founded in South Africa and based in the United Kingdom, Attix5 is the market leader in the development of remote, managed and secure backup and retrieval software. For more information on their software read this article. 2002 has seen the convergence of a number of factors that will be the springboard for the security market in 2003 and, more specifically, the growth of the market for … More

Panda Antivirus Platinum 7.0, Now Available from Tucows

Thanks to this new initiative, users can try out Panda Software’s new antivirus solution, free for one month, including daily updates and technical support MADRID, December 23, 2002 Panda Software, leading antivirus developer, and Tucows, the popular freeware and shareware portal, have agreed to make a complete version of Panda Antivirus Platinum 7.0 available to all users. This free download comes with one month’s services provided by Panda Software, including daily antivirus updates, 24h-365d technical … More

@stake Announces Release 2 of WebProxy

Interactive Security Tool Created by Renowned Security Experts Helps Software Engineers Build More Secure Web Applications Cambridge, MA, December 17, 2002 – @stake, Inc., ( the world’s largest independent digital security consulting firm, today announced the immediate commercial availability of @stake® WebProxyTM, a powerful interactive security tool that helps software developers, quality assurance engineers, and security professionals test and enhance the security of Web applications. Sitting between the developer’s browser and the Web application, WebProxy … More

RSA Security Enhances Security for Wireless LAN Environments

RSA Security Inc., announced the availability of new functionality for the industry-leading RSA SecurID two-factor authentication solution that enables enhanced protection in WLAN environments. Without the proper security measures in place, wireless connectivity will continue to be a major risk until more robust authentication protocols are adopted. Now, by securing WLANs with the proven solution for two-factor user authentication, organizations can realize the full benefits of WLANs – including cost reduction and productivity enhancement – … More