Trojan Uses Internet Explorer “Exploit.SelfExecHtml” Vulnerability
Kaspersky Labs, an international data security software developer, reports the appearance of the Trojan program, ‘StartPage’ – the first malware to infect …
Royal College of General Practitioners Chooses Trustix Linux Solutions to Help Keep GPs Informed
London, UK – 22nd May 2003 – The Royal College of General Practitioners (RCGP) has chosen Trustix and IBM to supply a Linux based e-mail server solution to support …
Cisco Extends Leadership in Integrated Network Security
New management, performance, and scalability extensions enhance and protect business productivity SAN JOSE, Calif., May 20, 2003 – Cisco Systems, Inc. today announced 14 …
Matrix Hacking – A Slice of Reality in a World of Make Believe
It might be all make believe, but the film – The Matrix: Reloaded – has opted for reality in one of its most important scenes, the hacking of the computer that …
Sophos Offers Free Web Updates To Protect Journalists From Computer Viruses
Sophos, a global leader in anti-virus protection for businesses, is offering freelance and home-office based journalists free anti-virus software which can be easily …
Intrusion Inc. Doubles Performance of Two Most Popular IDS Sensors
RICHARDSON, Texas–(BUSINESS WIRE)–May 20, 2003– Intrusion Inc. Leads in Price/Performance with Double the Performance and New Lower Prices for the Two Most …
PC-Duo Enterprise Remote Control v8 Provides Flexible Encryption
New remote control module of PC-Duo Enterprise adds flexibility for increased performance and security Tamworth, Staffordshire, UK – 20th May 2003 – Vector …
Taicom Chooses SSH Communications Security to Secure its VPN Router Series
HELSINKI, FINLAND; PALO ALTO, Calif. and TOKYO – May 20, 2003 – SSH Communications Security (HEX:SSH1V), a world-leading developer of Internet security solutions, …
Sobig.B Worm is Spreading at an Alarming Rate
F-Secure is raising the alert to the highest level as Sobig.B infections have been reported from over 80 countries worldwide. Sobig.B (also known as Palyh or Mankx) was first …
Neoteris Delivers Instant Secure Application Access To SAS For Mobile Consultants, Partners And Employees Throughout EMEA
SAS Selects Neoteris’ IVE to Enable Instant Secure Access to Enterprise Applications While Protecting Network from Unauthorized Access and Vulnerabilities FRANKFURT …
The Palyh Worm Appears as A Communique From Microsoft
Kaspersky Labs, an international data security software developer, reports the detection of a new network worm named “Palyh”, which is spreading via email and …
Palyh Worm Disguised as Microsoft Email
Sophos, a global leader in anti-virus protection for businesses, has warned that a new email-aware worm is spreading, disguised as an email appearing to come from …
Featured news
Resources
Don't miss
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised
- How CISOs can talk cybersecurity so it makes sense to executives