News & Commentary

Content posted in December 2006
Page 1 / 3   >   >>
2007: Trouble Ahead
News  |  12/29/2006  | 
Dark Reading gives you the lowdown on the main security threats to look out for in '07
ESET Touts Advanced+ Rating
News  |  12/28/2006  | 
ESET's NOD32 receives Advanced+ rating from AV-comparatives
Four Sure-Fire Spam Reducers
News  |  12/28/2006  | 
Don't settle for spam-heavy email traffic. Try these tips
The Six Dirtiest Tricks of 2006
News  |  12/27/2006  | 
Dark Reading remembers six of the sneakiest exploits of the year, as rated by readers
F5 Regains Compliance
News  |  12/26/2006  | 
F5 Networks has been notified by Nasdaq that it is in compliance with Nasdaq's requirements for continued listing on The Nasdaq Stock Market
SEC Exposes Online Fraudster
News  |  12/26/2006  | 
Estonian disguises his identity, uses stolen electronic IDs in classic 'pump and dump' scheme
Banks Ready for Compliance Deadline
News  |  12/22/2006  | 
With a week to go before the FFIEC deadline, most financial institutions are ready for multifactor authentication
RSA Wins HSPD-12 Contract
News  |  12/22/2006  | 
RSA Card Manager is a smart card management system designed to help federal agencies comply with HSPD-12
Popping the Vista Kernel
News  |  12/21/2006  | 
Microsoft can't release the API spec for third-party developers soon enough
Sourcefire Lawsuit: An IPO Distraction?
News  |  12/21/2006  | 
NetClarity claims that the Snort developer infringed on its intellectual property
Banks Use Comodo Solution
News  |  12/21/2006  | 
Community banks and credit unions adopting PKI-based, two-factor authentication solutions
VOIP More Vulnerable
News  |  12/20/2006  | 
Hear that? That's the sound of hackers starting to wield the latest VOIP hacking tools
Tempest in a Tape Encryptor
News  |  12/20/2006  | 
NeoScale accuses rival Decru of scare tactics in publicizing CERT advisory
nCipher Intros Embedded HSM
News  |  12/20/2006  | 
nCipher announces the immediate availability of its miniHSM - the world's first embedded hardware security module (HSM)
Survey: Slight Uptick in Security Spending
News  |  12/20/2006  | 
CISOs have their eyes on application security, NAC, and security services, according to Merrill Lynch survey
Websense to Buy PortAuthority for $90M
News  |  12/20/2006  | 
Threat prevention firms will sell integrated products
Liberty Alliance Hosts Event
News  |  12/20/2006  | 
Liberty Alliance announced 'Liberty 2.0,' a free public event to be held on Monday, January 22 in Redwood City
Nike Bares Its Sole
News  |  12/20/2006  | 
New combination of running shoes with Apple iPod leaves joggers open to electronic surveillance
Building Trust
News  |  12/19/2006  | 
Security pros see the impact of security on business reputation, but many higher-level execs don't
Perimeter Suggests Resolutions
News  |  12/19/2006  | 
While AI has come a long way, computer users are still the ones charged with security of their data, networks, and computers
Spam Service Shuttered
News  |  12/19/2006  | 
The last vestiges of old-school spam techniques signed off today with the demise of the Open Relay Database (ORDB)
IETF Trains Its Sights On NAC
News  |  12/19/2006  | 
Cisco, Juniper, Microsoft, and TCG join working group to develop protocol for endpoint security
An Apple (Bug) a Day
News  |  12/19/2006  | 
Happy New Year from your favorite hackers
AEP Networks Receives Award
News  |  12/19/2006  | 
AEP Networks has received the Government quality mark award for its AEP Netilla Security Platform (NSP) SSL VPN
Corpora Adds PKI Support to iOra
News  |  12/19/2006  | 
Corpora Software has launched version 4.10 of its iOra application acceleration and offline networking software
Polar Rose Intros Photo Search
News  |  12/19/2006  | 
Polar Rose announced its product and an open beta trial, beginning in Q1 of 2007
TriCipher Lands Customer
News  |  12/18/2006  | 
TriCipher and PSCU Financial Services have entered into an agreement to deploy the TACS solution as part of its InfoLinkPlus service
Vulnerability Tools Get Teeth
News  |  12/18/2006  | 
Vulnerability assessment tools are merging with configuration management, penetration testing, and even NAC
Laptop Encryption the Service Way
News  |  12/18/2006  | 
Not into building your own laptop encryption? New services should help
Marshal Attacks Spam
News  |  12/18/2006  | 
Marshal announces a successful first year of independent operation following its December 2005 management buy-out from NetIQ
Phishing Attacks on Rise
News  |  12/18/2006  | 
Cloudmark has seen a substantial increase in attacks on European banking brands, with increases of nearly 300% in a month in some cases
Risk Management's New Bell Curve
News  |  12/18/2006  | 
New report from McAfee points to need for insurance-like business model for IT security
Utimaco Shares Tips
News  |  12/18/2006  | 
Utimaco gives secure online shopping tips
Vericept Cited as Leader
News  |  12/18/2006  | 
Vericept has been cited as a leader in the Information Leak Prevention (ILP) Fourth Quarter 2006 Forrester Wave (December 2006) report
Phishing Your Own Users
News  |  12/18/2006  | 
New anti-phishing upgrades raise the profile of client-side attacks
McAfee Protects USDA
News  |  12/18/2006  | 
McAfee has been selected to protect the US Department of Agriculture's messaging system from spam, phishing, spyware, and virus attacks
Technology Jeopardizes The Secret Ballot
Commentary  |  12/15/2006  | 
Ed Felten at Freedom to Tinker has several brief, but meaty, posts this week on the erosion of a pillar of Western democracy: The secret ballot. The secret ballot offers two forms of protection: Because nobody can look over your shoulder to see how you voted, it's hard to coerce your vote. And, because you can't prove to anybody how you voted, you can't sell your vote. But technology and social trends are making the secret ballot harder to preserv
Outsource Security Carefully, And Carry A Big Audit Plan
Commentary  |  12/15/2006  | 
Are IT managers desperate if they outsource security? That's the provocative question Larry Greenemeier asks in today's issue of InformationWeek. His conclusion? A resolute no. In fact, hiring an independent service provider might just be your best bet for staying safe in the midst of rising threats against malware, hackers, and internal saboteurs.
PHP Security Expert Quits
News  |  12/15/2006  | 
'Communications issues' cited as Stefan Esser resigns
'Not Much Resistance at the Door'
News  |  12/15/2006  | 
Website security hasn't improved much over the past year, according to a survey of Web app security pros
EEye Discovers Worm/Botnet
News  |  12/15/2006  | 
EEye Digital Security has discovered Big Yellow, a non-Microsoft-based malware that has both worm and botnet characteristics
Seven Steps To Follow When Data Leakage Strikes
Commentary  |  12/14/2006  | 
At a recent summit on "data leakage," which sounds like an unfortunate side effect to a prescription medication, Experian Corp. chief information security officer James Christiansen provided a very useful rundown of what to do before, during, and
Authentium Unveils ESP
News  |  12/14/2006  | 
Authentium announced availability of the Authentium Extensible Service Platform (ESP) for Enterprise
Imperva Expands in Europe
News  |  12/14/2006  | 
Imperva announced the appointment of Jonathan Mepsted, formerly with Fortinet and NetScreen, as managing director for EMEA
Johnny Cache: Man in Black (Hat)
News  |  12/14/2006  | 
Renowned wireless hacker Jon Ellch talks money, bugs, and country music
CryptoCard Provides Authentication
News  |  12/14/2006  | 
CryptoCard signed a deal with YHGfL Foundation to provide two-factor authentication tokens to more than 500 people
How Much Is That Exploit in the Window?
News  |  12/14/2006  | 
Researcher relays sticker prices for some of today's hottest hacks
IBM Intros Consulting Service
News  |  12/14/2006  | 
IBM announced a first-of-its-kind consulting service designed to measure the way businesses govern data
Record Exposure Hits Milestone
News  |  12/14/2006  | 
More than 100 million personal records have been exposed since the infamous ChoicePoint hack in February of 2005
Novell Secures Palm Beach
News  |  12/13/2006  | 
Palm Beach County has tapped Novell for identity and desktop management across its network
Page 1 / 3   >   >>


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15504
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
CVE-2018-15505
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 a...
CVE-2018-15492
PUBLISHED: 2018-08-18
A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.
CVE-2018-15494
PUBLISHED: 2018-08-18
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
CVE-2018-15495
PUBLISHED: 2018-08-18
/filemanager/upload.php in Responsive FileManager before 9.13.3 allows Directory Traversal and SSRF because the url parameter is used directly in a curl_exec call, as demonstrated by a file:///etc/passwd value.