Search results for: vulnerability

A test of the ‘Email Security Testing Zone’

GFI is a worldwide supplier of security and communication tools for NT/2000 administrators. GFI’s security product range consists of MailSecurity email content checking + anti-virus software and LANguard network security software. Seven months ago, GFI announced the Email Security Testing Zone with the purpose of enabling organizations to check whether their computers and email systems are vulnerable to email viruses and attacks. Back then, GFI’s CEO Nick Galea praised this new service with the following … More

GFI’s Email Security Testing Zone Launches 3 New Tests

Helps admins strengthen their network defences against email exploits London, UK, 23 May 2002 – GFI’s Email Security Testing Zone,, has launched three new email tests. The new tests enable administrators to find out free of charge if their network is protected against emails using the Iframe Remote and Object Codebase exploits, and to check whether their anti-virus software is working properly. “GFI’s Email Security Testing Zone aims to help administrators keep abreast of … More

SQLsnake Code Analysis

Analysis by George Bakos & Guofei Jiang Institute for Security Technology Studies, Dartmouth College Full analysis with actual code can be found on I didn’t come up with the name sqlsnake; someone kind enough to provide a complete archive for analysis tagged it. Sounds good enough for now, unless someone wants to take credit for authoring this thing. The beauty(?) of this thing is that it is, again, an age old vulnerability coupled … More

Corporate Security Overview: 15-20 May 2002

A number of security companies send us their company press releases, which we republish in the press section of Help Net Security. This is an overview of interesting developments in the corporate security world during the past week. 15 May 2002 – Application Security, Inc. announced the availability of AppDetective for Sybase, which is an application security scanner designed to perform network-based penetration tests and vulnerability assessments. Application Security, Inc. extends AppDetective’s revolutionary methodology and … More

e-Travel Achieves TruSecure Certification

Leading Online Travel Technology Provider Selects Trusecure To Ensure Business Is Conducted In A Secure Environment HERNDON, Va.-May 20, 2002- TruSecure Corporation, a leading managed security services provider, today announced that e-Travel, the leading global provider of online travel technology, has selected TruSecure Perimeter service to secure its critical information assets from external threats. Additionally, e-Travel has completed the necessary requirements to achieve TruSecure Certification. TruSecure Certification confirms that e-Travel is effectively managing information security … More

Be On Guard for a False Klez Fix

Kaspersky Labs warns computer users about a distribution by an unknown malicious person of the Trojan program “TrojanDownloader.Win32.Smokedown”, which is hidden under the guise of a cure for the Klez Internet-worm. This malicious program was distributed via email. The infected message has an HTML format and harbors the following characteristics: Subject: You’re under a serious threat! Message Text: Kaspersky Labs urging users to take the necessary measures to protect themselves against the mounting threat from … More

Securing Linux

Here we go again. I decided to write another article concerning some overall security aspects of installing and running linux. To keep it short and simple, here are some good pointers to enhancing your system’s security. But remember, there’s no absolute security, so keep your eyes open, subscribe yourself to a few good mailing lists, and keep your software up-to-date. Partitioning Good partitioning does a lot of good to your system’s security as it greatly … More

Overview of personal firewalls

With the constant rise of permanent broadband connections that have many workstations online 24/7, there has been a growth in the number of attacks. In order to get a certain level of protection and piece of mind, the home user should install a personal firewall. If you are not familiar with how a firewall works I suggest you visit this link and find out more. For a lot more in-depth articles on the subject visit … More

Application Security, Inc. Releases AppDetective for Sybase

Sybase Discovery, Penetration Testing, and Vulnerability Assessment Scanner NEW YORK, NY – Application Security, Inc. ( announces the availability of AppDetective for Sybase, which is an application security scanner designed to perform network-based penetration tests and vulnerability assessments. Already empowering end-users to pro-actively secure Oracle, Microsoft SQL Server, and Lotus Domino installations, Application Security, Inc. extends AppDetective’s revolutionary methodology and knowledgebase of application-specific vulnerabilities to secure and protect Sybase databases. AppDetective easily locates, examines, reports, … More

Datastrip Offers Advanced 2D Bar Code System Helps Reduce ID Fraud

Datastrip’s Advanced 2D Bar Code System Helps Reduce ID Fraud Biometrics, Photos & Text Can Be Stored in Tiny High-Capacity Bar Code & Decoded with Handheld Reader, Offering Low-Cost Strategy for Enhancing Security EXTON, PA — Most ID badges and other forms of identification can be altered, hacked or stolen with relative ease. Now with rising concerns over identity theft and security threats, Datastrip Inc. offers a super-high-density two-dimensional bar code technology called 2D Superscript … More

iDEFENSE To Deliver iALERT Cyber-Threat Intelligence To The U.S. Department Of Health And Human Services

CHANTILLY, VA — (INTERNET WIRE) — 04/24/2002 — The U.S. Department of Health and Human Services (HHS) selected iDEFENSE Inc. to provide cyber-threat intelligence across its entire information technology enterprise. iDEFENSE, a global security intelligence company, generates thousands of Intelligence Reports on a variety of cyber threats. The federal agency responsible for safeguarding the health of all Americans will use iDEFENSE’s iALERT security intelligence services to strengthen the information security architecture of the Centers for … More

Warning! A new version of the I-worm “KLEZ” is spreading across the Internet

Kaspersky Labs announces the exposure of a new modified version of the “Klez” Internet-worm – Klez.h, already resulting in numerous computer infections in many countries including Japan, China, Austria and the Czech Republic. To gain entry to a computer the worm exploits a vulnerability in the Internet Explorer security system (the IFRAME vulnerability). Due to this Klez is able to imperceptibly infect computers immediately after the infected message is read. This special feature practically discounts … More