Products and Releases
Latest Content
Page 1 / 2   >   >>
Lancope Protects Retailers from Cyber-Attacks During Vulnerable Holiday Season
Products and Releases  |  11/24/2014  | 
Advanced, context-aware security helps combat cyber-attacks that bypass conventional defenses
Datablink Launches Operations, Offers Unique Technology Aimed at Simplifying User Authentication and Fighting Online Transaction Fraud
Products and Releases  |  11/24/2014  | 
Merger with Brazil-based BRToken creates company operating under the Datablink name with headquarters in Tysons Corner, Virginia and offices in Brazil
Former Subway Franchise Owner Sentenced to 18 Months in Prison for Gift Card Hacking Scheme at Subway Restaurants
Products and Releases  |  11/21/2014  | 
$40,000 in gift cards stolen in cash register hack.
OpenDNS Partners with Irish Reporting and Information Security Service to Fight Internet Threats
Products and Releases  |  11/21/2014  | 
OpenDNS’s Andrew Hay to Present New Research on Threats Facing Irish Internet Users
Agari and Palo Alto Networks Agree to Exchange Threat Intelligence Data
Products and Releases  |  11/18/2014  | 
Unique Dataset will Enhance Targeted Attack Prevention Capabilities
New Research Shows One Third of Retail Breaches Originated from Third-Party Vulnerabilities
Products and Releases  |  11/18/2014  | 
BitSight Analyzes Security Performance of Nation’s 300 Largest Retailers to Find an Industry Still Under Attack
Arxan’s Annual Report: ‘State of Mobile App Security’ Reveals an Increase in App Hacks for Top 100 Mobile Apps
Products and Releases  |  11/18/2014  | 
Findings Expose a Lack of Mobile Application Self-Protection for Mobile Financial, Retail/Merchant and Healthcare/Medical Apps
New, Free Certificate Authority to Dramatically Increase Encrypted Internet Traffic
Products and Releases  |  11/18/2014  | 
Non-Profit to Offer One-Click Process to Implement Secure Web Browsing
Verizon Enhances Managed Security Services Portfolio to Aid in Early Detection of Cyberthreats
Products and Releases  |  11/18/2014  | 
Synthesizes extensive global threat intelligence to deliver advanced security analysis
New 2015 Kevin Mitnick Security Awareness Training - Gartner Top 20 Pick
Products and Releases  |  11/18/2014  | 
The first fully integrated security awareness training and phishing platform gets a refresh making once optional user education a necessity
Added Network Visibility with Belden's Newest Security OS: HiSecOS 2.0
Products and Releases  |  11/18/2014  | 
Version 2.0 of Hirschmann’s Security Operating System Brings Enhanced VPN Connections and Dynamic Routing for Industrial Networks
Member of Organized Cybercrime Ring Responsible for $50 Million in Online Identity Theft Sentenced to 115 Months in Prison
Products and Releases  |  11/13/2014  | 
Case related to identity theft and credit card fraud ring known as “”
ISACA Survey: Most Consumers Aware of Major Data Breaches but Fewer than Half Have Changed Key Shopping Behaviors
Products and Releases  |  11/13/2014  | 
Results also reveal struggles with privacy and security as use of connected devices and wearables grows
Certification Program Developed Specifically for Risk Professionals
Products and Releases  |  11/13/2014  | 
The Certified Third Party Risk Professional (CTPRP) Designation Validates Third Party Risk Management Expertise
Entrust Datacard Bridges Digital Identity From Physical to Mobile
Products and Releases  |  11/13/2014  | 
Organizations now able to use investments in smartcard security as powerful mobile-based identities for authentication, secure login.
Information Security Forum Tackles Maturity Models with Introduction of New Report and Research Tool
Products and Releases  |  11/11/2014  | 
Report Explains How to Make the Right Decisions about Where to Develop Maturity; Introduces Process to Select and Use a Maturity Model Effectively and Efficiently
ExtraHop and FireEye Team Up to Defend Against Security Threats
Products and Releases  |  11/11/2014  | 
Combination of ExtraHop Wire Data Analytics Platform with the FireEye Threat Analytics Platform Enriches Existing Security Datasets to Monitor DNS Activity, HTTP Payload Data, and Reconnaissance Activity for Industry-Leading Threat Detection and Prevention.
Alert Logic Introduces First Fully Managed Suite Of Cloud Security Products
Products and Releases  |  11/10/2014  | 
Alert Logic Cloud Defender Delivers Full Stack Threat Detection and Protection; Drives Complexity and Cost Out of Cloud Security
More Than 400 .Onion Addresses, Including Dozens of ‘Dark Market’ Sites, Targeted as Part of Global Enforcement Action on Tor Network
Products and Releases  |  11/7/2014  | 
DOJ announces international law enforcement operation that seized website addresses and computer servers hosting these websites.
Operator of Silk Road 2.0 Website Charged in Manhattan Federal Court
Products and Releases  |  11/6/2014  | 
Silk Road 2.0, Launched in November 2013 After Its Predecessor was Shut Down by Law Enforcement, Has Enabled More Than 100,000 People to Buy and Sell Illegal Drugs Anonymously Over the Internet
FortiGuard Researchers Detect and Prevent New Sophisticated Point-of-Sale Threat
Products and Releases  |  11/6/2014  | 
New Backoff PoS malware variant “211G1” contains new techniques for evading analysis and detection mechanisms
OpenDNS Automates Security Policy Management for Managed Service Providers
Products and Releases  |  11/6/2014  | 
New Centralized Settings Capabilities Enable Service Providers to Streamline Customer Deployments, Automate Common Tasks and Simplify Security Policy Management
Over 70% of office workers don’t know who to report a security breach to
Products and Releases  |  11/6/2014  | 
Research conducted for the launch of UserLock 8 has found that fewer than a third of desk-based workers would know who to tell if they were party to a security breach
LANDESK Simplifies Control of IT Assets and Costs
Products and Releases  |  11/6/2014  | 
IT Asset Management Suite Gives Businesses Easy-to-Use System to Manage Licenses, Prepare for Software Audits.
Soltra Edge: An industry collaborates to fight cyber threats with information sharing
Products and Releases  |  11/6/2014  | 
Soltra Edge Leverages Open Standards, Distills Large Amounts of Data into Actionable Cyber Intelligence and Will Integrate with Other Cyber Security Solutions.
Porticor delivers protection of OpenStack computing with cloud key management security
Products and Releases  |  11/6/2014  | 
Newest Virtual Private Data System Leverages Software-Defined Key Management to Enhance Security and Cloud Data Protection Across OpenStack and VMware Environments.
GI Updates Forecasts for Wearable Biometrics
Products and Releases  |  11/6/2014  | 
Accuvant and FishNet Security Agree to Join Forces to Enable Customers to More Effectively Address the Growing Cyber Security Threat
Products and Releases  |  11/5/2014  | 
New, Combined Information Security Solutions Company to Have Increased Depth, Breadth, Scale and Reach to Solve the Most Complex Security Problems
ControlScan Launches New Educational Website to Help SMBs Properly Secure Customer Data
Products and Releases  |  11/5/2014  | 
New reference for SMBs.
Sophos Delivers Security for Android Devices
Products and Releases  |  11/5/2014  | 
New mobile security rollout.
Introducing The Check Point Capsule: Mobile Security That Goes Where You Go
Products and Releases  |  11/5/2014  | 
Revolutionary Single Solution to Secure Business Data and Mobile Devices
Merchants Set Record Straight on Cybersecurity and Payments
Products and Releases  |  10/30/2014  | 
RILA, NACS, NRF, NGA, FMI and MAG send letter to Credit Unions
NEW: Home Depot breach cost credit unions nearly $60M
Products and Releases  |  10/30/2014  | 
Target breach cost credit unions nearly $30 million.
Cigital Acquiring Security Testing-as-a-Service Provider iViZ Security
Products and Releases  |  10/28/2014  | 
Cigital leverages iViZ to introduce 3D Unlimited Application Security Testing
Georgia Tech Releases 2015 Emerging Cyber Threats Report
Products and Releases  |  10/28/2014  | 
Keynote will be delivered by Dave Aitel, CEO of Immunity Inc., at GA Tech conference.
Identifying Jailbroken iPhones/rooted Android Phones To Stop Fraud
Products and Releases  |  10/28/2014  | 
Award-winning mobile SDK enhancements identify jailbroken and rooted devices, expose location and device/operating system mismatches
Tripwire Announces Adaptive Threat Protection
Products and Releases  |  10/28/2014  | 
Tripwire Enterprise and IP360 integration delivers integrated, automated view of cybersecurity risk
Tufin delivers end-to-end change automation for Check Point, Cisco and Juniper firewalls
Products and Releases  |  10/22/2014  | 
Version R14-3 of the Tufin Orchestration Suite Enables SDN-Equivalent Agility for Network Security Infrastructure
Illumio Brings Adaptive Security to Morgan Stanley, Plantronics, Creative Artists Agency, Yahoo and NTT I3
Products and Releases  |  10/22/2014  | 
Startup reinvents security for 100 million+ undersecured physical and virtual servers in private data centers and public clouds
Workers put off mobile business apps due to password complications and network security fears
Products and Releases  |  10/22/2014  | 
Wide-scale survey shows almost a third of workers are put off accessing business-critical apps and reveals employees are frustrated by long, complex passwords
New Option for Enterprise to Cloud
Products and Releases  |  10/22/2014  | 
Radical new technology is backed by corporations, including GE and Qualcomm, as well as leading venture firms Andreessen Horowitz, Norwest Venture Partners, Sutter Hill Ventures and ARTIS Ventures
Application Data Control to secure IT/OT communications
Products and Releases  |  10/22/2014  | 
Stronger-than-firewall technology delivers on what industrial and next-gen firewalls promise
ISA Supports Treasury Initiative on Cybersecurity Incentives
Products and Releases  |  10/21/2014  | 
The Committee will meet for the first time next month to discuss cybersecurity insurance.
Page 1 / 2   >   >>

Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in mod/feedback/mapcourse.php in the Feedback module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the mod/feedback:mapcourse cap...

Published: 2014-11-24
lib/classes/grades_external.php in Moodle 2.7.x before 2.7.3 does not consider the moodle/grade:viewhidden capability before displaying hidden grades, which allows remote authenticated users to obtain sensitive information by leveraging the student role to access the get_grades web service.

Published: 2014-11-24
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by vi...

Published: 2014-11-24
mod/data/edit.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 sets a certain group ID to zero upon a database-entry change, which allows remote authenticated users to obtain sensitive information by accessing the database after an edit by a teacher.

Published: 2014-11-24
mod/forum/externallib.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 does not verify group permissions, which allows remote authenticated users to access a forum via the forum_get_discussions web service.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?