News & Commentary

Content posted in October 2006
Page 1 / 4   >   >>
Monitise Intros Accode
News  |  10/31/2006  | 
Monitise announced the launch of its two factor authentication service - Accode
Arxceo, JCI Team
News  |  10/31/2006  | 
Arxceo has completed the integration of its patented technologies, Plug and Protect and Tag-UR-IT into JCI's B-Mobile PHS product
Bank Uses Vasco
News  |  10/31/2006  | 
Vasco announced that US based Los Alamos National Bank will secure its corporate banking customers with Digipass 260 and Digipass GO3
Cryptocard Wins UK Contract
News  |  10/31/2006  | 
CryptoCard awarded a security contract by the UK's largest mental health trust
Strato Offers Email Security
News  |  10/31/2006  | 
Strato introduces ServerSide Security, a service to combat spam, phishing, and email viruses
The Web App Security Gap
News  |  10/31/2006  | 
Attacks on applications quickly evolve in intelligence, but most enterprises' Web application security strategies are still stuck in the primordial ooze
MX Logic Issues Report
News  |  10/31/2006  | 
MX Logic announced a 40 percent increase in overall email traffic from July through September
IE7 Feature Goes Buggy
News  |  10/31/2006  | 
If your IE7 browser starts scarfing CPU when you hit Ajax-laden sites, you may need to disable your anti-phishing filter
Expedia, Entrust Team
News  |  10/31/2006  | 
World's leading online travel company purchases suite of security software from Entrust
Secure Computing Targets Spam
News  |  10/31/2006  | 
Secure Computing announced it is waging war against image spam, where spammers hide messages in image files to escape detection
AEP Ships SmartGate 5.1
News  |  10/30/2006  | 
AEP Networks announced general availability of its application-layer security gateway product, AEP SmartGate
Not Your Grandpa's Microsoft
News  |  10/30/2006  | 
Think you're being smart by waiting for Vista's SP 2? Think again
The Vista-Forefront Security Two-Step
News  |  10/30/2006  | 
Legacy apps - Microsoft and non-Microsoft - may not get Forefront and Vista security, security experts say
Criminals in the Call Center?
News  |  10/30/2006  | 
New reports say call center employees could be leaking personal customer information
SAP Chooses Novell
News  |  10/30/2006  | 
SAP is using Novell eDirectory to support the more than 500,000 users registered to SAP Developer Network
Vernier, Kanematsu Partner
News  |  10/30/2006  | 
Kanematsu Electronics has selected Vernier's EdgeWall product family for its Network Access Control (NAC) solution
University Taps StealthWatch
News  |  10/30/2006  | 
Lancope announced that the University of Nottingham deployed the StealthWatch System to protect its network from threats
Data393 Inks Peerless Tyre
News  |  10/30/2006  | 
Data393 announced an agreement with Denver-based Peerless Tyre to host a VPN for 60 Peerless Tyre stores across seven states
Juniper Intros Strategy
News  |  10/30/2006  | 
Juniper Networks announced the Juniper branch office strategy
MySpace Under Siege
News  |  10/30/2006  | 
A weekend phishing attack and more XSS zero-day proof-of-concept code are testing the social networking site's security mettle
AirTight Announces 4.0
News  |  10/30/2006  | 
AirTight announced Release 4.0 of its SpectraGuard Planner wireless LAN and security planning tool
PortAuthority Intros 5.0
News  |  10/30/2006  | 
PortAuthority Technologies has redefined what the industry has considered as total protection of confidential information
V-Station Reader Selected
News  |  10/30/2006  | 
Bioscrypt announced that Merkatum Corporation is installing the Company's V-Station biometric reader
Covelight, Digital Resolve Team
News  |  10/30/2006  | 
Covelight Systems and Digital Resolve have entered into a strategic alliance
HR Awards Ethernet Leaders
News  |  10/30/2006  | 
Award winners were announced at Light Reading's Ethernet Expo 2006, the industry's biggest Ethernet event
M2SYS , PCS Team
News  |  10/29/2006  | 
M2SYS Technology has formed a partnership with PCS Revenue Control Systems, a leading provider of foodservice management technology
HSPD-12's Toothless Deadline
News  |  10/27/2006  | 
US federal government's mandate for physical and logical security plagued by confusion, lack of funding
Don't Blame the Browser
News  |  10/27/2006  | 
Not all Web bugs are in the browser - sometimes they're the result of the way the browser interacts with other apps
Mending Holes in the Blogosphere
News  |  10/27/2006  | 
Free Vox blogging service controls JavaScript, lets bloggers set privacy controls
Anatomy Of A Phishing Scam
Commentary  |  10/26/2006  | 
The invention of the phishing scam marked the first time in the history of computer viruses and malware that people could make serious money off of security attacks. Think it's easy to launch a phishing scam? It's not. But there's a big-time payoff for those who can successfully navigate through the following steps, as laid out by Andrew Klein, Everdream's director of product marketing.
Microsoft's Push Security Problems
News  |  10/26/2006  | 
New analyst report suggests that push email system may leave enterprise data vulnerable
A Public Snort
News  |  10/26/2006  | 
Sourcefire, maker of the popular open-source Snort security tool, files for an IPO
Symantec Slips in Europe
News  |  10/26/2006  | 
Still feeling the hangover of its Veritas acquisition in the heart of Europe
HomeConvenience, Comodo Team
News  |  10/26/2006  | has selected Comodo to protect, secure, and empower their customers with the highest level of online protection
Sophos Extends Control
News  |  10/26/2006  | 
Sophos announced the ability to control employee use of distributed computing applications on corporate networks
New Browsers, New Bugs
News  |  10/25/2006  | 
Two have already been reported in the new Internet Explorer 7. Will Firefox 2.0 face the same fate?
Cambia Joins Alliance
News  |  10/25/2006  | 
Cambia Security has become a Premier Alliance Partner in the Mercury Alliance Program
'Crimeware' Defined
News  |  10/25/2006  | 
Anti-Phishing Working Group and Department of Homeland Security explain most prevalent forms of online attacks
TNT Protects Georgia
News  |  10/25/2006  | 
Trusted Network Technologies is safeguarding Georgia's and New Mexico's voter registration systems
MySpace Hacker: Fix Is Flawed
News  |  10/25/2006  | 
The researcher who published proof-of-concept code of a MySpace flaw explains why he developed it - and why MySpace's fix might not hold
Symantec Reports Q2
News  |  10/25/2006  | 
Symantec reported results for the second quarter of fiscal year 2007
Outpost Firewall Scores High
News  |  10/25/2006  | 
Outpost Firewall Pro 4.0 from Agnitum is the software firewall best able to defend itself from direct and brutal attacks
LR Names Leading Lights Finalists
News  |  10/25/2006  | 
Finalists for the third annual Leading Lights Awards unveiled; winners to be announced at HR's Links 2006 Executive Summit
SurfControl Unveils Products
News  |  10/24/2006  | 
SurfControl's new set of product offerings enable customers to achieve greater levels of protection, flexibility and customization
It's the People, Stupid
News  |  10/24/2006  | 
After years of investing in technology, IT security departments are putting more effort - and dollars - in people and processes, study says
Month of Kernel Bugs to Come
News  |  10/24/2006  | 
Over the river and through the wood, to the bug hunter's house we go
Zero Day Flaw Found in MySpace
News  |  10/24/2006  | 
A variant of an XSS vulnerability opens the door for worms, phishing, and port scans via the popular social networking site
Promisec Unveils New Security
News  |  10/24/2006  | 
Promisec announced a major new release of its award-winning Promisec Spectator Professional software
NeoScale Faces Up to 4-Gig Encryption
News  |  10/24/2006  | 
Unveils 4-Gbit/s encryption, but are users ready to take the leap from 2-Gbit/s?
Tablus Makes Announcements
News  |  10/24/2006  | 
Tablus completes series B round of funding and appoints a new CFO
Page 1 / 4   >   >>

Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...
PUBLISHED: 2019-02-18
An issue was discovered in WTCMS 1.0. It allows remote attackers to execute arbitrary PHP code by going to the "Setting -> Mailbox configuration -> Registration email template" screen, and uploading an image file, as demonstrated by a .php filename and the "Content-Type: image/g...
PUBLISHED: 2019-02-18
An issue was discovered in WTCMS 1.0. It allows remote attackers to cause a denial of service (resource consumption) via crafted dimensions for the verification code image.