Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in October 2007
<<   <   Page 2 / 6   >   >>
SCA Names New Board, Execs
News  |  10/26/2007  | 
Smart Card Alliance announced its 2007-2008 board and seven-member executive committee
Net Security Woes Grows
Commentary  |  10/25/2007  | 
A new report that focuses on the security challenges facing small and midsized businesses shines a light on just how big those challenges are -- and which ones you may be overlooking.
Interop Winners: Desktop Conferencing, Deep Security
Commentary  |  10/25/2007  | 
It's a purely unscientific and anecdotal perspective, but here are my picks for most interesting and most needed technologies from Interop this week, plus the most startling stat I heard in my New York City travels.
Phoenix Partners With Rutkowska in Securing Hypervisor
News  |  10/25/2007  | 
New ultra-thin hypervisor will benefit from further Blue Pill research
Trust Digital Supports Windows Mobile 6
News  |  10/25/2007  | 
New functionality supports secure wireless PDAs and latest Windows Mobile release for enterprise smartphones
AppSecInc Awarded Patent
News  |  10/25/2007  | 
Company's innovation enables users to efficiently leverage encryption for more effective database security
Shallow Victory for the Federal Government
Commentary  |  10/25/2007  | 
Whether you realize it or not, John Zuccarini, a notorious scam artist, represents a threat to your online business. His cyberspace businesses illustrate the problems that the government must overcome to make it a safe haven for reputable enterprises.
Free Software Tests for Bot Infections
News  |  10/25/2007  | 
PineApp's free zombie test instantly discovers whether business computer networks have been hijacked
Sprint Adds Laptop Security to Mobile Broadband
News  |  10/25/2007  | 
Wireless carrier is first to distribute Alcatel-Lucent's Laptop Guardian connection card
Trend Micro to Buy Provilla
News  |  10/25/2007  | 
Trend Micro will augment content-security solutions with the addition of innovative data leak prevention experts, technology, and products
Actimize Adds Partner Certification Program
News  |  10/25/2007  | 
Unisys supports deployment certification program as a premier member
The Venetian Deploys Bioscrypt
News  |  10/25/2007  | 
World's largest casino deploys Bioscrypt's fingerprint & 3D face recognition biometric solutions
Startup Unveils Reputation-Based Spam Fighter
Quick Hits  |  10/25/2007  | 
New software rates messages based on user's propensity to receive spam
World Series Ticketing System Crashes, Rebounds
Commentary  |  10/24/2007  | 
The Colorado Rockies were felled by "an external malicious attack" that crashed its online system Monday.
ExploitMe: Free Firefox Plug-Ins Test Web Apps
News  |  10/24/2007  | 
Tools run directly on the browser and target pervasive XSS, SQL injection vulnerabilities in Web apps
Webroot Rebrands Its Consumer Products
News  |  10/24/2007  | 
PC Magazine Editor's Choice award winner expands to include self-configuring firewall
Weaponizing All Browsers
News  |  10/24/2007  | 
More Web hacking tools to help you become a Web app security master
Google CTO Talks SaaS, Security
News  |  10/24/2007  | 
The head of Google Enterprise says IT managers shouldn't fear SaaS
VZB Service Gets PCI-Compliant
News  |  10/24/2007  | 
Verizon US smart centers and transaction services network implement stronger industry standards to help companies strengthen their security
Is NAC Dying?
News  |  10/24/2007  | 
Frustrated with complexity and cost, many enterprises are retrenching their NAC strategies
Westar Energy Deploys PGP Encryption
News  |  10/24/2007  | 
Large utility provider implements PGP whole disk encryption for regulatory compliance
VOIP Users at Risk of Eavesdropping, DOS
News  |  10/24/2007  | 
Threat advisories cite issues exposing residential and SMB VOIP customers to multiple exploits and service interruptions
Gemalto, Devon IT Provide Security for Healthcare
News  |  10/24/2007  | 
Joint solution increases clinician and staffer productivity
TriCipher Launches MySignatureBook
News  |  10/24/2007  | 
TriCipher launches MySignatureBook for secure, fast and affordable electronic document signing
TriCipher Joins Partner Program
News  |  10/24/2007  | 
TriCipher today joined the SAFE (Signatures and Authentication for Everyone) BioPharma Association Vendor Partner Program
NetMotion Gets Certified for Windows Mobile 6
News  |  10/24/2007  | 
Forty percent of NetMotion's customers use Windows Mobile within deployments
US Still No. 1 Spam-Relayer
News  |  10/24/2007  | 
US captures high-profile spammers, but general computer security remains worryingly lax
Denial-of-Rockies-Tickets Attack
Quick Hits  |  10/24/2007  | 
Ticket-sales system unable to thwart DDOS attack, leaving many Colorado Rockies fans empty-handed
Winning Web Scanning Firm Gets DDOSed
News  |  10/23/2007  | 
NTObjectives finds that its newfound fame has its price
Webcast: Straight Talk on Web 2.0 Security
News  |  10/23/2007  | 
Secure Computing Webinar looks at the results of a study on the state of Web 2.0 security, emerging threats, and a guide to best practices
Researchers Create New 'Fingerprinting' Method
News  |  10/23/2007  | 
New tool to be released in conjunction with SecTor conference in Toronto next month
BitDefender Adds Detection for iPhone
News  |  10/23/2007  | 
Antivirus protection for users who 'unlock' their phone
200,000 Notified of Lost Backup Tape
News  |  10/23/2007  | 
West Virginia Public Employees Insurance says tape contains names, addresses, Social Security information
Raytheon Completes Oakley Buy
News  |  10/23/2007  | 
Integration of Oakley Capabilities enhances strong information security portfolio
Arcot Software Receives NIST Validation
News  |  10/23/2007  | 
Arcot achieves NIST FIPS validation 'Gold Standard' for IT security
Arcot, SAFE-BioPharma Team on Digital Sigs
News  |  10/23/2007  | 
Arcot digital signature solution available for use with SAFE-BioPharma Association's new roaming digital ID
Aberdeen Reports on Attack Prevention
News  |  10/23/2007  | 
Aberdeen Group research reveals that a strategic approach to encryption and key management reduces data security incidents
'Fiendish' Trojan Creates Parallel eBay Universe
Quick Hits  |  10/23/2007  | 
Exploit even creates fake third-party validation sites
Bradford Networks Announces v4 of NACs
News  |  10/23/2007  | 
Bradford Networks announces version 4.0 of Campus Manager and NAC Director
ForeScout Opens NAC Training Centers
News  |  10/23/2007  | 
ForeScout Technologies establishes training centers across US in response to high demand for NAC deployments
Protegrity Rolls Out Web Application Firewall
News  |  10/23/2007  | 
Protegrity's Defiance Threat Management System (TMS) first to offer multiple deployment options
Webinar: Best Practices for Data Security
News  |  10/23/2007  | 
Gamma hosts Webinar with former Symantec security VP on best practices for SAP data security
Open Group, ABA Release Security Paper
News  |  10/23/2007  | 
Open Group Security Forum and ABA's Cyberspace Law Committee issue whitepaper on information-centric security governance
Internet Security Hall Of Shame
Commentary  |  10/22/2007  | 
What are the ten biggest -- and, alas, most common -- Internet security mistakes made by small and midisized businesses, their employees, vendors, family and friends?
Upstart Takes New Tack on Digital Signatures
News  |  10/22/2007  | 
TriCipher's new MySignatureBook enables multiple signers to authorize a single document electronically
Study: ID Thieves Get Their Hands Dirty
News  |  10/22/2007  | 
Research on US Secret Service identity theft cases shows criminals used more manual methods
StillSecure Opens Cobia to Developers
News  |  10/22/2007  | 
Cobia SDK creates first truly open network infrastructure platform
DeviceWall Becomes Content-Aware
News  |  10/22/2007  | 
Centennial Software addresses data leakage problem with first content-aware endpoint security solution
TriGeo Merges Biz Intelligence, SIEM
News  |  10/22/2007  | 
TriGeo InSight first to bring business intelligence to SIEM
ICSA Labs Certifies Four Products
News  |  10/22/2007  | 
ICSA Labs certifies four products that use new IP security standard
<<   <   Page 2 / 6   >   >>


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.