Dark Reading's Mobile Application
Dark Reading on the iPad
Get the day's most vital IT security news, analysis and commentary
It's easier than ever to get the security technology news and analysis you need with Dark Reading's iPad app, featuring one-touch access to breaking news, stories and commentary compiled daily by Dark Reading's editors.
Among the benefits is that viewing and navigation is optimized for the iPad, with clean links to news and commentary in six main categories: Breaches, Vulnerabilities, Application Security (App Sec), Security Management (Sec Management), Mobile and Endpoint. The app also makes it incredibly easy to share content via e-mail, Twitter and Facebook.
Download Dark Reading's iPad app for free from the iTunes app store today. Don't miss the latest insights from Dark Reading's award-winning editors Tim Wilson and Kelly Jackson Higgins.
Free Research and Reports
- HP Newsletter with Gartner Research: Maximizing Your Infrastructure through Virtualization
- Understanding Holistic Database Security 8 Steps to Successfully Securing Enterprise Data Sources
- A How-To Guide on Using Cloud Services for Security-Rich Data Backup
- Holistic Risk Management: Perspectives from IT Professionals
- Aligning IT with strategic business goals: A proactive approach to managing IT risk to your business
- Digital Disruption - E2 Conference Boston
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- Learn how to enage customers through mobility - Mobile Commerce World - Mobile Commerce World
- The A-to-Z of Building Your Big Data Initiative - E2 Conference Boston - E2 Conference Boston
- How to Choose a SaaS Vendor - E2 Conference Boston
Dark Reading Digital Magazine
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
TURCK BL20 Programmable Gateway and BL67 Programmable Gateway have hardcoded accounts, which allows remote attackers to obtain administrative access via an FTP session.
Heap-based buffer overflow in an ActiveX component in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to cause a denial of service via a crafted web page.
Stack-based buffer overflow in an ActiveX component in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to cause a denial of service via a crafted web page.
Directory traversal vulnerability in the PmWebDir object in the web server in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to read arbitrary files via unspecified vectors.
engine/lib/access.php in Elgg before 1.8.5 does not properly clear cached access lists during plugin boot, which allows remote attackers to read private entities via unspecified vectors.