Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in December 2006
Page 1 / 3   >   >>
2007: Trouble Ahead
News  |  12/29/2006  | 
Dark Reading gives you the lowdown on the main security threats to look out for in '07
ESET Touts Advanced+ Rating
News  |  12/28/2006  | 
ESET's NOD32 receives Advanced+ rating from AV-comparatives
Four Sure-Fire Spam Reducers
News  |  12/28/2006  | 
Don't settle for spam-heavy email traffic. Try these tips
The Six Dirtiest Tricks of 2006
News  |  12/27/2006  | 
Dark Reading remembers six of the sneakiest exploits of the year, as rated by readers
F5 Regains Compliance
News  |  12/26/2006  | 
F5 Networks has been notified by Nasdaq that it is in compliance with Nasdaq's requirements for continued listing on The Nasdaq Stock Market
SEC Exposes Online Fraudster
News  |  12/26/2006  | 
Estonian disguises his identity, uses stolen electronic IDs in classic 'pump and dump' scheme
Banks Ready for Compliance Deadline
News  |  12/22/2006  | 
With a week to go before the FFIEC deadline, most financial institutions are ready for multifactor authentication
RSA Wins HSPD-12 Contract
News  |  12/22/2006  | 
RSA Card Manager is a smart card management system designed to help federal agencies comply with HSPD-12
Popping the Vista Kernel
News  |  12/21/2006  | 
Microsoft can't release the API spec for third-party developers soon enough
Sourcefire Lawsuit: An IPO Distraction?
News  |  12/21/2006  | 
NetClarity claims that the Snort developer infringed on its intellectual property
Banks Use Comodo Solution
News  |  12/21/2006  | 
Community banks and credit unions adopting PKI-based, two-factor authentication solutions
VOIP More Vulnerable
News  |  12/20/2006  | 
Hear that? That's the sound of hackers starting to wield the latest VOIP hacking tools
Tempest in a Tape Encryptor
News  |  12/20/2006  | 
NeoScale accuses rival Decru of scare tactics in publicizing CERT advisory
nCipher Intros Embedded HSM
News  |  12/20/2006  | 
nCipher announces the immediate availability of its miniHSM - the world's first embedded hardware security module (HSM)
Survey: Slight Uptick in Security Spending
News  |  12/20/2006  | 
CISOs have their eyes on application security, NAC, and security services, according to Merrill Lynch survey
Websense to Buy PortAuthority for $90M
News  |  12/20/2006  | 
Threat prevention firms will sell integrated products
Liberty Alliance Hosts Event
News  |  12/20/2006  | 
Liberty Alliance announced 'Liberty 2.0,' a free public event to be held on Monday, January 22 in Redwood City
Nike Bares Its Sole
News  |  12/20/2006  | 
New combination of running shoes with Apple iPod leaves joggers open to electronic surveillance
Building Trust
News  |  12/19/2006  | 
Security pros see the impact of security on business reputation, but many higher-level execs don't
Perimeter Suggests Resolutions
News  |  12/19/2006  | 
While AI has come a long way, computer users are still the ones charged with security of their data, networks, and computers
Spam Service Shuttered
News  |  12/19/2006  | 
The last vestiges of old-school spam techniques signed off today with the demise of the Open Relay Database (ORDB)
IETF Trains Its Sights On NAC
News  |  12/19/2006  | 
Cisco, Juniper, Microsoft, and TCG join working group to develop protocol for endpoint security
An Apple (Bug) a Day
News  |  12/19/2006  | 
Happy New Year from your favorite hackers
AEP Networks Receives Award
News  |  12/19/2006  | 
AEP Networks has received the Government quality mark award for its AEP Netilla Security Platform (NSP) SSL VPN
Corpora Adds PKI Support to iOra
News  |  12/19/2006  | 
Corpora Software has launched version 4.10 of its iOra application acceleration and offline networking software
Polar Rose Intros Photo Search
News  |  12/19/2006  | 
Polar Rose announced its product and an open beta trial, beginning in Q1 of 2007
TriCipher Lands Customer
News  |  12/18/2006  | 
TriCipher and PSCU Financial Services have entered into an agreement to deploy the TACS solution as part of its InfoLinkPlus service
Vulnerability Tools Get Teeth
News  |  12/18/2006  | 
Vulnerability assessment tools are merging with configuration management, penetration testing, and even NAC
Laptop Encryption the Service Way
News  |  12/18/2006  | 
Not into building your own laptop encryption? New services should help
Marshal Attacks Spam
News  |  12/18/2006  | 
Marshal announces a successful first year of independent operation following its December 2005 management buy-out from NetIQ
Phishing Attacks on Rise
News  |  12/18/2006  | 
Cloudmark has seen a substantial increase in attacks on European banking brands, with increases of nearly 300% in a month in some cases
Risk Management's New Bell Curve
News  |  12/18/2006  | 
New report from McAfee points to need for insurance-like business model for IT security
Utimaco Shares Tips
News  |  12/18/2006  | 
Utimaco gives secure online shopping tips
Vericept Cited as Leader
News  |  12/18/2006  | 
Vericept has been cited as a leader in the Information Leak Prevention (ILP) Fourth Quarter 2006 Forrester Wave (December 2006) report
Phishing Your Own Users
News  |  12/18/2006  | 
New anti-phishing upgrades raise the profile of client-side attacks
McAfee Protects USDA
News  |  12/18/2006  | 
McAfee has been selected to protect the US Department of Agriculture's messaging system from spam, phishing, spyware, and virus attacks
Technology Jeopardizes The Secret Ballot
Commentary  |  12/15/2006  | 
Ed Felten at Freedom to Tinker has several brief, but meaty, posts this week on the erosion of a pillar of Western democracy: The secret ballot. The secret ballot offers two forms of protection: Because nobody can look over your shoulder to see how you voted, it's hard to coerce your vote. And, because you can't prove to anybody how you voted, you can't sell your vote. But technology and social trends are making the secret ballot harder to preserv
Outsource Security Carefully, And Carry A Big Audit Plan
Commentary  |  12/15/2006  | 
Are IT managers desperate if they outsource security? That's the provocative question Larry Greenemeier asks in today's issue of InformationWeek. His conclusion? A resolute no. In fact, hiring an independent service provider might just be your best bet for staying safe in the midst of rising threats against malware, hackers, and internal saboteurs.
PHP Security Expert Quits
News  |  12/15/2006  | 
'Communications issues' cited as Stefan Esser resigns
'Not Much Resistance at the Door'
News  |  12/15/2006  | 
Website security hasn't improved much over the past year, according to a survey of Web app security pros
EEye Discovers Worm/Botnet
News  |  12/15/2006  | 
EEye Digital Security has discovered Big Yellow, a non-Microsoft-based malware that has both worm and botnet characteristics
Seven Steps To Follow When Data Leakage Strikes
Commentary  |  12/14/2006  | 
At a recent summit on "data leakage," which sounds like an unfortunate side effect to a prescription medication, Experian Corp. chief information security officer James Christiansen provided a very useful rundown of what to do before, during, and
Authentium Unveils ESP
News  |  12/14/2006  | 
Authentium announced availability of the Authentium Extensible Service Platform (ESP) for Enterprise
Imperva Expands in Europe
News  |  12/14/2006  | 
Imperva announced the appointment of Jonathan Mepsted, formerly with Fortinet and NetScreen, as managing director for EMEA
Johnny Cache: Man in Black (Hat)
News  |  12/14/2006  | 
Renowned wireless hacker Jon Ellch talks money, bugs, and country music
CryptoCard Provides Authentication
News  |  12/14/2006  | 
CryptoCard signed a deal with YHGfL Foundation to provide two-factor authentication tokens to more than 500 people
How Much Is That Exploit in the Window?
News  |  12/14/2006  | 
Researcher relays sticker prices for some of today's hottest hacks
IBM Intros Consulting Service
News  |  12/14/2006  | 
IBM announced a first-of-its-kind consulting service designed to measure the way businesses govern data
Record Exposure Hits Milestone
News  |  12/14/2006  | 
More than 100 million personal records have been exposed since the infamous ChoicePoint hack in February of 2005
Novell Secures Palm Beach
News  |  12/13/2006  | 
Palm Beach County has tapped Novell for identity and desktop management across its network
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.