Search results for: vulnerability

Symantec to Acquire Recourse Technologies

Gains Greater than Gigabit Speed Network Intrusion Detection Solutions CUPERTINO, Calif. – July 17, 2002 – Symantec Corp. (Nasdaq: SYMC) today announced the acquisition of Recourse Technologies for approximately US$135 million in cash. The acquisition will bring to Symantec true gigabit speed network intrusion detection with next generation hybrid technology and the industry’s leading “honeypot” solution. The acquisition, conditioned upon customary regulatory approvals, is expected to close by mid-August 2002. “With many companies moving to … More

Symantec To Acquire SecurityFocus

Offers Most Complete Security Early Warning System Available CUPERTINO, Calif. – July 17, 2002 – Symantec Corp. (Nasdaq: SYMC) today announced the acquisition of SecurityFocus for approximately US$75 million in cash. With this acquisition, Symantec will offer customers the most comprehensive, proactive early warning system across the broadest range of threats. The transaction is expected to close by early to mid-August 2002. “SecurityFocus has established the most respected security community and developed one of the … More

Beware of Frethem Worm

In the latest press release, Panda Software warns users of a new e-mail virus: W32/Frethem.K. While this e-mail worm carries a rather low threat level, it is spreading rapidly throughout Europe (this is possibly a questionable assumption). The e-mail message carries only one subject field: “Re: Your password!” and exploits the vulnerability in Microsoft Internet Explorer versions 5.01 and 5.5. This older vulnerability allows the virus to run automatically when the user views the message … More

E-Mail Message “Your Password!” Is A Virus

Los Angeles, July 15, 2002 Panda Software, leading antivirus software producer, warns users of a new e-mail virus: W32/Frethem.K. While this e-mail worm carries a rather low threat level, it is spreading rapidly throughout Europe. The e-mail message carries only one subject field: “Re: Your password!” and, as Klez, exploits the vulnerability in Internet Explorer 5.01 and 5.5 that allows the virus to run automatically when the user views the message in the preview pane. … More

PGP Outlook Encryption Plug-in Vulnerability

eEye staffers Marc Maiffret and Riley Hassell, were again busy on finding the bugs, so a new advisory hit the “streets” today. This time, there is a remote vulnerability in NAI PGP Outlook plug-in which is included in these products: NAI PGP Desktop Security 7.0.4, NAI PGP Personal Security 7.0.3 and NAI PGP Freeware 7.0.3. eEye’s information on the vulnerability can be found below (just an overview of the problem, for full advisory click the … More

Security Company-PivX, Adds World Class Security Researcher and Announces Major New Vulnerability in Internet Explorer

Security Company-PivX, Adds World Class Security Researcher and Announces Major New Vulnerability in Internet Explorerâ„?. Newport Beach, CA, July 10, 2002 (PRN) : PivX Solutions, a leader in Network Security is pleased to announce the partnering with one of the worlds pre-eminent security researchers, Mr. Thor Larholm of Copenhagen Denmark. Mr. Larholm has been personally responsible for the discovery of a multitude of software security vulnerabilities in Microsoft’s Internet Explorer. As a part of Mr. … More

Black Hat Briefings 2002 Keynotes Include NSA Director And Special Advisor To The President

NSA Security Evaluations Group Technical Director Richard George & Richard Clarke – Special Advisor to the President for Cyberspace Security http://www.blackhat.com/ — Black Hat Inc. today announced the keynote speakers for this summer’s Black Hat Briefings and Training 2002, the annual conference and workshop designed to help computer professionals better understand the security risks to their computer and information infrastructures by potential threats. This year’s show will focus on 8 tracks of hot topics including … More

Panda Software: Klez.I Leads the Top Ten List

In June and for the third month running, Klez.I tops the list of the most virulent malicious code, compiled from the results of the free online virus scanner, Panda ActiveScan. Klez.I is a rapidly-spreading e-mail worm that sends itself out to all addresses in the affected computer’s address book and has variable message texts and subject fields. It can also change the apparent e-mail address of the sender to give the impression that it has … More

Information Survivability: Required Shifts in Perspective

The events of recent years and especially of recent months have greatly increased awareness of information and infrastructure security, whether they are media reports of the latest cyber attacks and vulnerabilities or postulations as to the degree of permeability of our critical infrastructures. While this may spark reactions such as reviews of organizational computer security policies and vulnerability assessments, attention to issues of security, while important, cannot ensure the preservation of mission-critical services when systems … More

Symantec Acquires Mountain Wave, Inc.

Adds Security Management Technology to Symantec Portfolio CUPERTINO, Calif. – July 2, 2002 – Symantec Corp. (Nasdaq: SYMC), the world leader in Internet security, today announced the acquisition of Mountain Wave, Inc., a leading provider of enterprise security management software and services, for $20 million in cash. The acquisition brings to Symantec the patent-pending CyberWolf technology designed to automate the detection of security incidents by the intelligent analysis of security events and alerts in real-time. … More

Intrusion Inc. Announces Second Quarter 2002 Results on Thursday, July 18 2002

RICHARDSON, Texas–(BUSINESS WIRE)–July 3, 2002– Investor Conference Call, Webcast and Replay Accessible After Financial Results Released Intrusion Inc. (Nasdaq:INTZ) will announce second quarter 2002 financial results after the market close on Thursday, July 18, 2002. The full text of the release will be available over First Call and by fax after the wire services have published the press release. The release will also be available on the company’s Web site at www.intrusion.com. Intrusion management will … More

BSD.Worm.Scalper Analysis

Virus analyzed by: Sorin Victor DUDEA BitDefender Virus Researcher http://www.bitdefender.com Name: BSD.Worm.Scalper Aliases: FreeBSD.Scalper.Worm Type: Executable Worm Mailer Size: ~51626 bytes Discovered: 06, 29, 2002 Detected: 06, 29, 2002, 14:00 (GMT+2) Spreading: Low Damage: Low ITW: Unknown Symptoms: – file .a in tmp Technical description: This is an Internet worm that attacks Apache servers running under FreeBSD platforms. It uses the Apache HTTP Server chunk encoding stack overflow vulnerability to upload itself and run under … More