Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in December 2007
<<   <   Page 3 / 4   >   >>
BitDefender Antivirus 2008 Gets Certified
News  |  12/11/2007  | 
Polymorphic file infectors and rampant false positives keep half of entrants uncertified
Gemalto Adds Strong ID to Citrix Access Gateway
News  |  12/11/2007  | 
Gemalto adds strong identity protection to Citrix Access Gateway
NeuStar Launches DNS Advantage Service
News  |  12/11/2007  | 
Advanced recursive service brings new levels of Internet security and performance
Abaca Provides Email Protection for Higher Ed
News  |  12/11/2007  | 
Innovative anti-spam solution ensures campus-wide security with minimal IT support
US Army's NETCOM Adds IPS, Security Mgt
News  |  12/11/2007  | 
US Army NETCOM awards NitroSecurity $3M contract
Astaro Provides VPN Option for iPhone
News  |  12/11/2007  | 
Astaro turns Apple iPhone into business tool
SafeNet IPSec Toolset Optimized
News  |  12/10/2007  | 
SafeNet and AMCC joint embedded security solution saves networking equipment manufacturers development time and money
Belgian Notaries Use nCipher
News  |  12/10/2007  | 
nCipher Technology helps public notaries in Belgium Go Digital
Wipro, Skybox Launch Service
News  |  12/10/2007  | 
Partnership creates comprehensive IT risk and compliance services powered by Skybox View
NSA Certifies Smallest, Lightest IP Encryptor
News  |  12/10/2007  | 
NSA certifies smallest, lightest IP encryptor from General Dynamics
Mobile Device Security: Use 'Em, Don't Lose 'Em
Commentary  |  12/10/2007  | 
Last week's bMighty bMobile Virtual Expo included an observation about handheld device security that was stunner: 30 percent of handhelds are lost every year.
Real Data in App Testing Poses Real Risks
News  |  12/10/2007  | 
Simulated or 'anonymized' data is a better option than exposing live data to outside sources
Success Through Automation
News  |  12/10/2007  | 
It's good to simplify repetitive processes, but be sure you keep security in mind
End Users Flout Enterprise Security Policies
News  |  12/10/2007  | 
Separate studies show many users understand rules, but they break them anyway
Beyond the PCI Band-Aid
News  |  12/10/2007  | 
Web application firewalls can help retailers pass their audits, but app firewalls aren't enough to secure customer data
Study: Users Have False Sense of Security
Quick Hits  |  12/10/2007  | 
Over 90% think they're pretty safe on the Internet, but about half of them are at risk, Verizon says
MessageLabs Announces Annual Report
News  |  12/10/2007  | 
Report highlights how 2007 has been a year of diversity due to the vast number of tactics, techniques, and Trojans entering the security market
AlcaLu to Resell InfoExpress NAC, Firewall
News  |  12/10/2007  | 
Alcatel-Lucent to resell InfoExpress' network access control and firewall technology
Finjan Identifies New Genre of Crimeware Trojans
News  |  12/10/2007  | 
In Web security trends report, Finjan explores 'Trojan 2.0' attacks that utilize regular Web 2.0 technology to exploit legitimate Web services
Cenzic Integrates VMWare
News  |  12/10/2007  | 
Cenzic introduces automated security assessment of Web applications in production through virtualization
Klocwork Partners With Japanese Firm
News  |  12/10/2007  | 
CEC to provide Klocwork's products and services through its PROVEQ Source Code Verification Brand
Guardian Analytics Releases FraudMAP
News  |  12/9/2007  | 
New solution helps financial institutions protect customer assets, integrity of online channels
DOE Lab Break-in May Be Tip of the Iceberg
News  |  12/7/2007  | 
Data breach at Oak Ridge National Laboratory part of a series of cyberattacks - possibly out of China - on US laboratories and institutions
News  |  12/7/2007  | 
Don't forget to secure your server hardware in case of physical theft
AV Gets a Facelift
News  |  12/7/2007  | 
New features such as whitelisting take the spotlight in next generation of endpoint protection products
Lessons From High School
News  |  12/7/2007  | 
Old-school, no-tech mistakes can lead to data leakage
Vendor Threatens Secunia With Legal Action if It Reports Bug
Quick Hits  |  12/7/2007  | 
Autonomy says vulnerability already fixed, Secunia says it's not
Websense Predicts Top 10 Threats for '08
News  |  12/6/2007  | 
Olympics, online advertisements, and Web 2.0 threats top hacker's to-do lists
UK Hosting Service Shuts Down Websites After Database Breach
Quick Hits  |  12/6/2007  | 
One of the UK's largest hosting providers has pulled the plug on hundreds of Websites after attackers tried to use stolen data
Credit Card Security: 'Tis The Season To Be Compliant
Commentary  |  12/6/2007  | 
When it comes to customers' credit card information, how much should small and midsize businesses be worrying about compliance this holiday season? The same as every other season -- a lot.
Peering Inside the IRC Botnet
News  |  12/6/2007  | 
New report by Chinese and German researchers provides bird's eye view of how an Internet Relay Chat botnet operates
Astaro Rolls Out New Security Gateway
News  |  12/6/2007  | 
New Astaro Security Gateway Version 7.1 now available
BitDefender Gets $7M for Expansion
News  |  12/6/2007  | 
BitDefender receives funding to support global expansion and advance leadership position in antivirus software and data security
Avinti Sees Surge in Blended Threat Emails
News  |  12/6/2007  | 
NEWT blocks email attacks that link to Web-based malware
'Prevention' Can Give Hackers a Shot in the Arm
News  |  12/6/2007  | 
Intrusion prevention systems may help attackers to evolve
One in 10 Organizations Properly Protects Data
News  |  12/5/2007  | 
New research outlines key steps to protect sensitive data
PricewaterhouseCoopers, SailPoint Team
News  |  12/5/2007  | 
SailPoint Technologies and PricewaterhouseCoopers will team to deliver comprehensive identity risk management solutions across the enterprise
Sailpoint Rolls Out New ID Risk Mgt Software
News  |  12/5/2007  | 
SailPoint Technologies released Compliance IQ 2.0, the latest version of the company's identity risk management software
Cybercriminals Suffer Major Data Leak
Quick Hits  |  12/5/2007  | 
Waves of stolen personal data, credit card information now spreading fast around Warez, cracker forums
Japanese Financial Services Firm Gets WAF
News  |  12/5/2007  | 
Gaitame.Com selects Imperva to protect Web-based foreign exchange trading platform
Better-Behaved AV Testing
News  |  12/5/2007  | 
The newly formed Anti-Malware Testing Working Group will determine how best to conduct behavioral tests
Ranum's Wild Security Ride
News  |  12/5/2007  | 
Marcus Ranum dispels firewall myths, revives Medieval horsemanship, and rants about researchers
US Air Force Selects Cigital
News  |  12/5/2007  | 
Air Force selects Cigital to provide expert guidance in software assurance
Mobile Data a Moving Liability
News  |  12/5/2007  | 
Realtor offers up tips for taking the fangs out of the unstructured data explosion
Calyptix Adds to Sales & Development
News  |  12/5/2007  | 
Calyptix builds staff to meet market demand
Shavlik Names New CTO
News  |  12/5/2007  | 
Shavlik Technologies announced the appointment of Eric Schultze to the position of chief technology officer
SANS Says You And Your Employees Are Top Security Risks. Ya Think?
Commentary  |  12/4/2007  | 
Computer security trainer SANS Institute came out with its top threats of 2007 recently, and guess what? You're on the list, and so are your employees; so am I, and, probably, so is everybody we know and most of the people we don't.
WhiteHat Rolls Out Sentinel SE
News  |  12/4/2007  | 
New addition to WhiteHat Sentinel family provides broad access to Web application security for enterprise and PCI 6.6 customers
Grisoft Buys Exploit Prevention Labs
News  |  12/4/2007  | 
Grisoft acquires Exploit Prevention Labs, developer of LinkScanner safe surfing technology
TJX Settles With Banks for $41 Million
News  |  12/4/2007  | 
More than 100 million account records were breached, retail giant reveals
<<   <   Page 3 / 4   >   >>

A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-18
Path Traversal in HongCMS v4.0.0 allows remote attackers to view, edit, and delete arbitrary files via a crafted POST request to the component &quot;/hcms/admin/index.php/language/ajax.&quot;
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from an assertion failure vulnerability in the btest process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.