Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in December 2006
Page 1 / 3   >   >>
2007: Trouble Ahead
News  |  12/29/2006  | 
Dark Reading gives you the lowdown on the main security threats to look out for in '07
ESET Touts Advanced+ Rating
News  |  12/28/2006  | 
ESET's NOD32 receives Advanced+ rating from AV-comparatives
Four Sure-Fire Spam Reducers
News  |  12/28/2006  | 
Don't settle for spam-heavy email traffic. Try these tips
The Six Dirtiest Tricks of 2006
News  |  12/27/2006  | 
Dark Reading remembers six of the sneakiest exploits of the year, as rated by readers
F5 Regains Compliance
News  |  12/26/2006  | 
F5 Networks has been notified by Nasdaq that it is in compliance with Nasdaq's requirements for continued listing on The Nasdaq Stock Market
SEC Exposes Online Fraudster
News  |  12/26/2006  | 
Estonian disguises his identity, uses stolen electronic IDs in classic 'pump and dump' scheme
Banks Ready for Compliance Deadline
News  |  12/22/2006  | 
With a week to go before the FFIEC deadline, most financial institutions are ready for multifactor authentication
RSA Wins HSPD-12 Contract
News  |  12/22/2006  | 
RSA Card Manager is a smart card management system designed to help federal agencies comply with HSPD-12
Popping the Vista Kernel
News  |  12/21/2006  | 
Microsoft can't release the API spec for third-party developers soon enough
Sourcefire Lawsuit: An IPO Distraction?
News  |  12/21/2006  | 
NetClarity claims that the Snort developer infringed on its intellectual property
Banks Use Comodo Solution
News  |  12/21/2006  | 
Community banks and credit unions adopting PKI-based, two-factor authentication solutions
VOIP More Vulnerable
News  |  12/20/2006  | 
Hear that? That's the sound of hackers starting to wield the latest VOIP hacking tools
Tempest in a Tape Encryptor
News  |  12/20/2006  | 
NeoScale accuses rival Decru of scare tactics in publicizing CERT advisory
nCipher Intros Embedded HSM
News  |  12/20/2006  | 
nCipher announces the immediate availability of its miniHSM - the world's first embedded hardware security module (HSM)
Survey: Slight Uptick in Security Spending
News  |  12/20/2006  | 
CISOs have their eyes on application security, NAC, and security services, according to Merrill Lynch survey
Websense to Buy PortAuthority for $90M
News  |  12/20/2006  | 
Threat prevention firms will sell integrated products
Liberty Alliance Hosts Event
News  |  12/20/2006  | 
Liberty Alliance announced 'Liberty 2.0,' a free public event to be held on Monday, January 22 in Redwood City
Nike Bares Its Sole
News  |  12/20/2006  | 
New combination of running shoes with Apple iPod leaves joggers open to electronic surveillance
Building Trust
News  |  12/19/2006  | 
Security pros see the impact of security on business reputation, but many higher-level execs don't
Perimeter Suggests Resolutions
News  |  12/19/2006  | 
While AI has come a long way, computer users are still the ones charged with security of their data, networks, and computers
Spam Service Shuttered
News  |  12/19/2006  | 
The last vestiges of old-school spam techniques signed off today with the demise of the Open Relay Database (ORDB)
IETF Trains Its Sights On NAC
News  |  12/19/2006  | 
Cisco, Juniper, Microsoft, and TCG join working group to develop protocol for endpoint security
An Apple (Bug) a Day
News  |  12/19/2006  | 
Happy New Year from your favorite hackers
AEP Networks Receives Award
News  |  12/19/2006  | 
AEP Networks has received the Government quality mark award for its AEP Netilla Security Platform (NSP) SSL VPN
Corpora Adds PKI Support to iOra
News  |  12/19/2006  | 
Corpora Software has launched version 4.10 of its iOra application acceleration and offline networking software
Polar Rose Intros Photo Search
News  |  12/19/2006  | 
Polar Rose announced its product and an open beta trial, beginning in Q1 of 2007
TriCipher Lands Customer
News  |  12/18/2006  | 
TriCipher and PSCU Financial Services have entered into an agreement to deploy the TACS solution as part of its InfoLinkPlus service
Vulnerability Tools Get Teeth
News  |  12/18/2006  | 
Vulnerability assessment tools are merging with configuration management, penetration testing, and even NAC
Laptop Encryption the Service Way
News  |  12/18/2006  | 
Not into building your own laptop encryption? New services should help
Marshal Attacks Spam
News  |  12/18/2006  | 
Marshal announces a successful first year of independent operation following its December 2005 management buy-out from NetIQ
Phishing Attacks on Rise
News  |  12/18/2006  | 
Cloudmark has seen a substantial increase in attacks on European banking brands, with increases of nearly 300% in a month in some cases
Risk Management's New Bell Curve
News  |  12/18/2006  | 
New report from McAfee points to need for insurance-like business model for IT security
Utimaco Shares Tips
News  |  12/18/2006  | 
Utimaco gives secure online shopping tips
Vericept Cited as Leader
News  |  12/18/2006  | 
Vericept has been cited as a leader in the Information Leak Prevention (ILP) Fourth Quarter 2006 Forrester Wave (December 2006) report
Phishing Your Own Users
News  |  12/18/2006  | 
New anti-phishing upgrades raise the profile of client-side attacks
McAfee Protects USDA
News  |  12/18/2006  | 
McAfee has been selected to protect the US Department of Agriculture's messaging system from spam, phishing, spyware, and virus attacks
Technology Jeopardizes The Secret Ballot
Commentary  |  12/15/2006  | 
Ed Felten at Freedom to Tinker has several brief, but meaty, posts this week on the erosion of a pillar of Western democracy: The secret ballot. The secret ballot offers two forms of protection: Because nobody can look over your shoulder to see how you voted, it's hard to coerce your vote. And, because you can't prove to anybody how you voted, you can't sell your vote. But technology and social trends are making the secret ballot harder to preserv
Outsource Security Carefully, And Carry A Big Audit Plan
Commentary  |  12/15/2006  | 
Are IT managers desperate if they outsource security? That's the provocative question Larry Greenemeier asks in today's issue of InformationWeek. His conclusion? A resolute no. In fact, hiring an independent service provider might just be your best bet for staying safe in the midst of rising threats against malware, hackers, and internal saboteurs.
PHP Security Expert Quits
News  |  12/15/2006  | 
'Communications issues' cited as Stefan Esser resigns
'Not Much Resistance at the Door'
News  |  12/15/2006  | 
Website security hasn't improved much over the past year, according to a survey of Web app security pros
EEye Discovers Worm/Botnet
News  |  12/15/2006  | 
EEye Digital Security has discovered Big Yellow, a non-Microsoft-based malware that has both worm and botnet characteristics
Seven Steps To Follow When Data Leakage Strikes
Commentary  |  12/14/2006  | 
At a recent summit on "data leakage," which sounds like an unfortunate side effect to a prescription medication, Experian Corp. chief information security officer James Christiansen provided a very useful rundown of what to do before, during, and
Authentium Unveils ESP
News  |  12/14/2006  | 
Authentium announced availability of the Authentium Extensible Service Platform (ESP) for Enterprise
Imperva Expands in Europe
News  |  12/14/2006  | 
Imperva announced the appointment of Jonathan Mepsted, formerly with Fortinet and NetScreen, as managing director for EMEA
Johnny Cache: Man in Black (Hat)
News  |  12/14/2006  | 
Renowned wireless hacker Jon Ellch talks money, bugs, and country music
CryptoCard Provides Authentication
News  |  12/14/2006  | 
CryptoCard signed a deal with YHGfL Foundation to provide two-factor authentication tokens to more than 500 people
How Much Is That Exploit in the Window?
News  |  12/14/2006  | 
Researcher relays sticker prices for some of today's hottest hacks
IBM Intros Consulting Service
News  |  12/14/2006  | 
IBM announced a first-of-its-kind consulting service designed to measure the way businesses govern data
Record Exposure Hits Milestone
News  |  12/14/2006  | 
More than 100 million personal records have been exposed since the infamous ChoicePoint hack in February of 2005
Novell Secures Palm Beach
News  |  12/13/2006  | 
Palm Beach County has tapped Novell for identity and desktop management across its network
Page 1 / 3   >   >>

7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-10
IBM Cloud Pak for Security (CP4S) and could allow a user to obtain sensitive information or perform actions they should not have access to due to incorrect authorization mechanisms. IBM X-Force ID: 198919.
PUBLISHED: 2021-05-10
IBM Control Desk and is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199228.
PUBLISHED: 2021-05-10
IBM Cloud Pak for Security (CP4S) and is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force I...
PUBLISHED: 2021-05-10
Ticketer is a command based ticket system cog (plugin) for the red discord bot. A vulnerability allowing discord users to expose sensitive information has been found in the Ticketer cog. Please upgrade to version 1.0.1 as soon as possible. As a workaround users may unload the ticketer cog to disable...
PUBLISHED: 2021-05-10
An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.