Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in December 2006
Page 1 / 3   >   >>
2007: Trouble Ahead
News  |  12/29/2006  | 
Dark Reading gives you the lowdown on the main security threats to look out for in '07
ESET Touts Advanced+ Rating
News  |  12/28/2006  | 
ESET's NOD32 receives Advanced+ rating from AV-comparatives
Four Sure-Fire Spam Reducers
News  |  12/28/2006  | 
Don't settle for spam-heavy email traffic. Try these tips
The Six Dirtiest Tricks of 2006
News  |  12/27/2006  | 
Dark Reading remembers six of the sneakiest exploits of the year, as rated by readers
F5 Regains Compliance
News  |  12/26/2006  | 
F5 Networks has been notified by Nasdaq that it is in compliance with Nasdaq's requirements for continued listing on The Nasdaq Stock Market
SEC Exposes Online Fraudster
News  |  12/26/2006  | 
Estonian disguises his identity, uses stolen electronic IDs in classic 'pump and dump' scheme
Banks Ready for Compliance Deadline
News  |  12/22/2006  | 
With a week to go before the FFIEC deadline, most financial institutions are ready for multifactor authentication
RSA Wins HSPD-12 Contract
News  |  12/22/2006  | 
RSA Card Manager is a smart card management system designed to help federal agencies comply with HSPD-12
Popping the Vista Kernel
News  |  12/21/2006  | 
Microsoft can't release the API spec for third-party developers soon enough
Sourcefire Lawsuit: An IPO Distraction?
News  |  12/21/2006  | 
NetClarity claims that the Snort developer infringed on its intellectual property
Banks Use Comodo Solution
News  |  12/21/2006  | 
Community banks and credit unions adopting PKI-based, two-factor authentication solutions
VOIP More Vulnerable
News  |  12/20/2006  | 
Hear that? That's the sound of hackers starting to wield the latest VOIP hacking tools
Tempest in a Tape Encryptor
News  |  12/20/2006  | 
NeoScale accuses rival Decru of scare tactics in publicizing CERT advisory
nCipher Intros Embedded HSM
News  |  12/20/2006  | 
nCipher announces the immediate availability of its miniHSM - the world's first embedded hardware security module (HSM)
Survey: Slight Uptick in Security Spending
News  |  12/20/2006  | 
CISOs have their eyes on application security, NAC, and security services, according to Merrill Lynch survey
Websense to Buy PortAuthority for $90M
News  |  12/20/2006  | 
Threat prevention firms will sell integrated products
Liberty Alliance Hosts Event
News  |  12/20/2006  | 
Liberty Alliance announced 'Liberty 2.0,' a free public event to be held on Monday, January 22 in Redwood City
Nike Bares Its Sole
News  |  12/20/2006  | 
New combination of running shoes with Apple iPod leaves joggers open to electronic surveillance
Building Trust
News  |  12/19/2006  | 
Security pros see the impact of security on business reputation, but many higher-level execs don't
Perimeter Suggests Resolutions
News  |  12/19/2006  | 
While AI has come a long way, computer users are still the ones charged with security of their data, networks, and computers
Spam Service Shuttered
News  |  12/19/2006  | 
The last vestiges of old-school spam techniques signed off today with the demise of the Open Relay Database (ORDB)
IETF Trains Its Sights On NAC
News  |  12/19/2006  | 
Cisco, Juniper, Microsoft, and TCG join working group to develop protocol for endpoint security
An Apple (Bug) a Day
News  |  12/19/2006  | 
Happy New Year from your favorite hackers
AEP Networks Receives Award
News  |  12/19/2006  | 
AEP Networks has received the Government quality mark award for its AEP Netilla Security Platform (NSP) SSL VPN
Corpora Adds PKI Support to iOra
News  |  12/19/2006  | 
Corpora Software has launched version 4.10 of its iOra application acceleration and offline networking software
Polar Rose Intros Photo Search
News  |  12/19/2006  | 
Polar Rose announced its product and an open beta trial, beginning in Q1 of 2007
TriCipher Lands Customer
News  |  12/18/2006  | 
TriCipher and PSCU Financial Services have entered into an agreement to deploy the TACS solution as part of its InfoLinkPlus service
Vulnerability Tools Get Teeth
News  |  12/18/2006  | 
Vulnerability assessment tools are merging with configuration management, penetration testing, and even NAC
Laptop Encryption the Service Way
News  |  12/18/2006  | 
Not into building your own laptop encryption? New services should help
Marshal Attacks Spam
News  |  12/18/2006  | 
Marshal announces a successful first year of independent operation following its December 2005 management buy-out from NetIQ
Phishing Attacks on Rise
News  |  12/18/2006  | 
Cloudmark has seen a substantial increase in attacks on European banking brands, with increases of nearly 300% in a month in some cases
Risk Management's New Bell Curve
News  |  12/18/2006  | 
New report from McAfee points to need for insurance-like business model for IT security
Utimaco Shares Tips
News  |  12/18/2006  | 
Utimaco gives secure online shopping tips
Vericept Cited as Leader
News  |  12/18/2006  | 
Vericept has been cited as a leader in the Information Leak Prevention (ILP) Fourth Quarter 2006 Forrester Wave (December 2006) report
Phishing Your Own Users
News  |  12/18/2006  | 
New anti-phishing upgrades raise the profile of client-side attacks
McAfee Protects USDA
News  |  12/18/2006  | 
McAfee has been selected to protect the US Department of Agriculture's messaging system from spam, phishing, spyware, and virus attacks
Technology Jeopardizes The Secret Ballot
Commentary  |  12/15/2006  | 
Ed Felten at Freedom to Tinker has several brief, but meaty, posts this week on the erosion of a pillar of Western democracy: The secret ballot. The secret ballot offers two forms of protection: Because nobody can look over your shoulder to see how you voted, it's hard to coerce your vote. And, because you can't prove to anybody how you voted, you can't sell your vote. But technology and social trends are making the secret ballot harder to preserv
Outsource Security Carefully, And Carry A Big Audit Plan
Commentary  |  12/15/2006  | 
Are IT managers desperate if they outsource security? That's the provocative question Larry Greenemeier asks in today's issue of InformationWeek. His conclusion? A resolute no. In fact, hiring an independent service provider might just be your best bet for staying safe in the midst of rising threats against malware, hackers, and internal saboteurs.
PHP Security Expert Quits
News  |  12/15/2006  | 
'Communications issues' cited as Stefan Esser resigns
'Not Much Resistance at the Door'
News  |  12/15/2006  | 
Website security hasn't improved much over the past year, according to a survey of Web app security pros
EEye Discovers Worm/Botnet
News  |  12/15/2006  | 
EEye Digital Security has discovered Big Yellow, a non-Microsoft-based malware that has both worm and botnet characteristics
Seven Steps To Follow When Data Leakage Strikes
Commentary  |  12/14/2006  | 
At a recent summit on "data leakage," which sounds like an unfortunate side effect to a prescription medication, Experian Corp. chief information security officer James Christiansen provided a very useful rundown of what to do before, during, and
Authentium Unveils ESP
News  |  12/14/2006  | 
Authentium announced availability of the Authentium Extensible Service Platform (ESP) for Enterprise
Imperva Expands in Europe
News  |  12/14/2006  | 
Imperva announced the appointment of Jonathan Mepsted, formerly with Fortinet and NetScreen, as managing director for EMEA
Johnny Cache: Man in Black (Hat)
News  |  12/14/2006  | 
Renowned wireless hacker Jon Ellch talks money, bugs, and country music
CryptoCard Provides Authentication
News  |  12/14/2006  | 
CryptoCard signed a deal with YHGfL Foundation to provide two-factor authentication tokens to more than 500 people
How Much Is That Exploit in the Window?
News  |  12/14/2006  | 
Researcher relays sticker prices for some of today's hottest hacks
IBM Intros Consulting Service
News  |  12/14/2006  | 
IBM announced a first-of-its-kind consulting service designed to measure the way businesses govern data
Record Exposure Hits Milestone
News  |  12/14/2006  | 
More than 100 million personal records have been exposed since the infamous ChoicePoint hack in February of 2005
Novell Secures Palm Beach
News  |  12/13/2006  | 
Palm Beach County has tapped Novell for identity and desktop management across its network
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-24
Opencast is a free and open source solution for automated video capture and distribution at scale. Prior to Opencast 10.14 and 11.7, users could pass along URLs for files belonging to organizations other than the user's own, which Opencast would then import into the current organization, bypassing o...
PUBLISHED: 2022-05-24
GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0...
PUBLISHED: 2022-05-24
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. Prior to version 6.1.11, he USBX DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or...
PUBLISHED: 2022-05-24
The default configuration of a TreeGrid component uses Object::toString as a key on the client-side and server communication in Vaadin 14.8.5 through 14.8.9, 22.0.6 through 22.0.14, 23.0.0.beta2 through 23.0.8 and 23.1.0.alpha1 through 23.1.0.alpha4, resulting in potential information disclosure of ...
PUBLISHED: 2022-05-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.