Search results for: software

Qualys Detects and Provides Analysis of Newly-Discovered Linux Trojan

Supplies Free Detection and Cleansing Tools to Prevent Exploits of New Threat REDWOOD SHORES, Calif., January 9, 2002 – Qualysâ„?, Inc., a leader in Managed Vulnerability Assessment, announces the detection and analysis of a new and potentially dangerous Remote Shell Trojan, referenced as RST.b, with backdoor and self-replicating functionality. Machines can become infected through binary email attachment or downloaded files. RST.b then installs a backdoor that listens for network traffic coming through any UDP port, … More

Paranoia Vs. Transparency And Their Effects On Internet Security

Reactions to non-intrusive probes and network activity that is merely unexpected are becoming increasingly hostile; a result from increasing amounts of incidents and security threats. From my perspective of security, overreactions to activities not crossing authorization and legal boundaries, are leading to a scenario where anyone acquiring basic information about a system needs to be afraid about potential consequences. Seen under a wide scope, this leads to network security no longer being transparent. Why a … More

Network-1 Announces Certification as NetIQ WebTrends Partner

WALTHAM, Mass., Jan 8, 2002 (BUSINESS WIRE) — Network-1 Security Solutions, Inc. (Nasdaq: NSSI), announced today that its CyberwallPLUS(TM) family of products completed and passed certification for interoperability with NetIQ’s WebTrends Firewall Reporting Solutions. Network-1 is one of the first intrusion prevention solutions for desktops, laptops and servers to be certified under the program. This certification assures users of the compatibility of CyberwallPLUS with the security management tools in WebTrends Firewall Reporting Solutions. “Desktop and … More

New virus to send shockwaves through internet?

Sophos, a world leader in corporate anti-virus protection, has discovered the first virus capable of infecting Shockwave Flash files commonly used on popular websites. The SWF/LFM-926 virus targets webmasters who use Shockwave to make their websites more attractive with animation and special effects. End users who browse an affected website may become infected if they download and open the Flash file on their computer. “Computer users visiting snazzy sites would get more than they bargained … More

Qualys Joins Check Point’s New OPSEC Security Assessment Initiative

QualysGuard’s Real-time Managed Vulnerability Assessment Service Adds Proactive Policy-Checking Service for Check Point VPN-1/FireWall-1 REDWOOD SHORES, Calif., Jan. 8 /PRNewswire/ — Qualys(TM), Inc., the pioneer of Automated Vulnerability Assessment, today announced participation in the Check Point Software Technologies Ltd. (Nasdaq: CHKP) OPSEC(TM) (Open Platform for Security) Security Assessment Initiative. The newly announced initiative provides a method for certification of tools and services that help validate network security through vulnerability assessment and corrective action. For more … More

Survey: Concerns About Wireless Security

WIRELESS SECURITY WORRIES ON THE RISE, SAYS INFORMATION SECURITY MAGAZINE READER POLL Norwood, Mass.–January 7, 2002–A recent survey of more than 1,200 IT and security professionals found that concerns about wireless security are paralleling the rapid build-out of wireless infrastructure in corporate settings, but the skills set for securing those networks aren’t keeping pace. The survey, published in the January 2002 issue of Information Security magazine, an independent media division of TruSecure Corp., is part … More

Sniff’em Captures And Monitors Network Traffic

After 15 months of development, Y.A.S.C (Yet Another Software Company) has released the gold master CD of Sniff’em. Sniff’em is a competitively-priced, high performance Windows packet sniffer that monitors and analyzes network traffic, allows network managers to detect and eliminate bottlenecks and other network related problems, and performs application debugging, fault analysis, network protocol analysis, data stream filtering, network intrusion detection, and usage monitoring. Sniff’em makes it easy to discover why computers on the network … More

Top Ten Viruses Reported To Sophos In December 2001

This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses as compiled by Sophos, a world leader in corporate anti-virus protection. For December 2001, the chart is as follows, with the most frequently occurring virus at number one: 1. W32/Badtrans-B (Badtrans variant) – 92.4% 2. W32/Goner-A (Goner variant) – 1.0% 3. W32/Magistr-B (Magistr variant) – 0.9% 4. W32/Sircam-A (Sircam variant) – 0.7% 5. W32/Magistr-A (Magistr variant) – … More

Outlook XP administrators can now test if their system is secure against email threats

London, UK, 2 January 2002 – GFI’s Email Security Testing Zone,, has launched two email tests targeted at Outlook XP administrators. Despite Outlook XP’s default security settings that do not allow users to run any executable attachments, certain email threats can circumvent Outlook XP’s standard protection measures. The two new tests enable Outlook XP users to check whether their system is vulnerable to such threats. Both tests consist of an email carrying an executable … More

New Security Hardened Protocol Replaces SMTP In Corporate Environments

SETAP (Secure Email Transport Authentication Protocol) is a network Email Server protocol that incorporates 2048-bit 4AES Encryption for secure data transmission; a virtually infallible method of client authentication without the use of certificates that may be intercepted and forged; and utilizes Random Data Ports over a 2048-bit 4AES Encrypted Channel using a Unique Session Key for each transaction. CTD Technologies’ patented SETAP Server appliance is built entirely around SETAP. Incorporating some of the industry’s finest … More

Full Disclosure of Vulnerabilities – pros/cons and fake arguments

Should the complete details of security vulnerabilities be made public or not? Not only do we need to understand the true pros and cons, but we also need to understand the “fake arguments” – the arguments people bring forth to serve some other purpose than making the “truely right” decision. This paper will try to point out all these things, to aid in building a more complete picture of the full disclosure concept. What should … More

Kaspersky Anti-Virus Localized for Europan Countries

20 December 2001 Kaspersky Anti-Virus Now Speaks French, Spanish, German and Italian Localized versions are now available in the Kaspersky Labs Internet store Kaspersky Labs, an international data-security software-development company, announces that its flagship, award-winning suite, Kaspersky Anti-Virus, is now available in four of the world’s most widespread languages: French, Spanish, German and Italian. The localized versions of the software are now available for purchase in European retail shops as well as at Kaspersky Labs’ … More