Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in March 2007
<<   <   Page 2 / 5   >   >>
Could This Be The 'Longest-Running Internet Breach Ever'?
Commentary  |  3/23/2007  | 
That old saw, "We're from the government, and we're here to help you," could stand some updating in this digital life. How about this one: "We're from the government, and we're here to give your identity away -- no questions asked."
The Stars of Security
News  |  3/23/2007  | 
Technology may be the heart of security, but some very dynamic people are giving it a face as well
New RFID Attack Opens the Door
News  |  3/23/2007  | 
Proof-of-concept lets intruder gain entry into the building by faking RFID readers with SQL injection
What to Do When Your Security's Breached
News  |  3/23/2007  | 
Experts offer a quick primer on how to respond to security incidents - and how not to
Oracle Sues SAP for Espionage
News  |  3/22/2007  | 
Database giant alleges SAP grabbed thousands of documents using IDs of defecting Oracle customers
Apollo Lands Security Concerns
News  |  3/22/2007  | 
Alpha version of Adobe Web development platform for desktops brings power and potential risks
NPulse Debuts NetFlow Probe
News  |  3/22/2007  | 
NPulse Networks LLC has announced a new security-hardened release of its nProbe appliance
Biometrics to Unveil Face Recog Tech at ISC
News  |  3/22/2007  | 
Bioscrypt announced the unveiling of its 3D face recognition solutions will take place at the ISC West Conference, March 28th - 30th
AtlantiCare Selects Third Brigade for Host IPS
News  |  3/22/2007  | 
Third Brigade announced the selection of its software by AtlantiCare, a regional, not-for-profit healthcare organization based in New Jersey
General Dynamics Wins $5M Army Deal
News  |  3/22/2007  | 
General Dynamics C4 Systems has been awarded one of two $5 million development contracts for the U.S. Army's POET program
Phishing, Crimeware Jump in '07
News  |  3/21/2007  | 
Anti-Phishing Working Group's latest numbers show ISPs, social networks are fastest-growing targets
Careful, The Boss Is Watching
News  |  3/21/2007  | 
Vendors tout employee monitoring tools to reduce insider threat, improve productivity
By Hook or By Crook
News  |  3/21/2007  | 
With some time, persistence, and a cup of coffee, you too can add a wireless AP for stealth access
Endace Offers Monitors
News  |  3/21/2007  | 
Endace Ltd. announced the release of its NinjaProbe network monitoring appliance family
Veracode Launches Blog
News  |  3/21/2007  | 
Veracode announces the launch of the Zero in a Bit blog
Post-Warhol Worms
News  |  3/21/2007  | 
Samy MySpace's dizzying propagation speed may be outdone by some imminent super-massive worms
Yoggie Picked for Red Herring 100
News  |  3/21/2007  | 
Red Herring announced that Yoggie Security Systems is a recipient of Red Herring 100 Europe
IOD Picks AEP for Secure Remote Working
News  |  3/21/2007  | 
The Institute of Directors (IOD) has begun rolling out secure remote working technology from policy based networking leader AEP Networks
Provilla Reports Endpoint Leakage
News  |  3/21/2007  | 
Enterprises seeking to combat data leakage will require a comprehensive approach, says a recent survey commissioned by Provilla
Speech Stirs Clickstream Controversy
News  |  3/20/2007  | 
Online privacy proponents express concerns over ISP licensing of end-user Web surfing data
AppSec Updates PCI Campaign
News  |  3/20/2007  | 
AppSec is announcing an updated campaign to help large organizations accelerate PCI compliance
Trolling in the Cyber Underground
News  |  3/20/2007  | 
Researcher discovers new trojan and a massive data theft ring that uses malware as a service
Grab Fingerprint, Then Attack
News  |  3/20/2007  | 
Researcher demos easy IDS/IPS evasion at InfoSec World this week
Cyberoam Extends UTM
News  |  3/20/2007  | 
Cyberoam announces notable feature enhancements to its UTM solution
Database Security Tool Reaches Out
News  |  3/20/2007  | 
Imperva's new feature helps identify database security threats
Aladdin Adds DRM to Software
News  |  3/20/2007  | 
Aladdin Knowledge Systems announced general availability of its new HASP HL NetTime key
Gemalto, Utimaco Launch Device
News  |  3/20/2007  | 
Gemalto and Utimaco jointly introduce an innovative USB device that features two functionalities in an 'all-in-one' solution
InBoxer Extended to IBM
News  |  3/20/2007  | 
InBoxer extends easy email archiving and compliance to IBM Lotus Domino and Notes
SenSage, Symantec Partner
News  |  3/20/2007  | 
SenSage announces support of Symantec Messaging Security through integrations with Symantec Mail Security, Symantec Brightmail AntiSpam
CipherOptics Announces Support
News  |  3/20/2007  | 
CipherOptics announces the release and general availability of Layer 2 support for CipherEngine
Agnitum Betas New Solution
News  |  3/20/2007  | 
Leading Russian firewall developer opens public beta for proactive all-round Internet security software
Provilla Reports on Data Leakage
News  |  3/20/2007  | 
Enterprises seeking to combat data leakage will require a comprehensive approach, says a recent survey commissioned by Provilla
Spy Agency Posts Windows, OS X Security Guides
Commentary  |  3/19/2007  | 
Who should know more about security than the National Security Agency? (Hey, it's their middle name!) No one, presumably. Which is why you might want to check out a series of security configuration guides the NSA has posted for Windows XP, 2000, Mac OS X, and Sun Solaris.
Tools Fight Forensics
News  |  3/19/2007  | 
Anti-forensics tools are giving attackers more cover, InfoSec World speaker says
Tokens' Big Flaw
News  |  3/19/2007  | 
EBay's new password keyfob is a nice concept, if not particularly well thought out
Risk Factors
News  |  3/19/2007  | 
Microsoft badly misfires with its plan to treat the same risks differently in Windows XP, Vista
Huge Leak Revealed at Japanese Firm
News  |  3/19/2007  | 
Former employee absconds with 8.64 million pieces of customer data from 43 clients of Dai Nippon Printing
GuardianEdge Goes Portable
News  |  3/19/2007  | 
Security startup dives into removable media with drive encryption software
BitArmor Joins PCI Group
News  |  3/19/2007  | 
BitArmor Systems announced it has joined the Payment Card Industry (PCI) Security Vendor Alliance
Seagate, GuardianEdge Team
News  |  3/19/2007  | 
GuardianEdge Technologies announced a strategic relationship with Seagate Technology
nCipher Helps Secure Croatia
News  |  3/19/2007  | 
nCipher announces that its payShield HSM has been deployed at the core of a new telephone and internet banking system in Croatia
FullArmor Intros Endpoint Security Manager
News  |  3/19/2007  | 
FullArmor, the leader in enterprise policy management, announced FullArmor Endpoint Policy Manager
Perimeter Launches Services
News  |  3/19/2007  | 
Perimeter eSecurity has launched a powerful new suite of Identity Protection Services
CrossTec Uses Third Brigade
News  |  3/19/2007  | 
Third Brigade announced its HIPS product has been integrated with CrossTec Activeworx Security Center
Securent Joins With OASIS
News  |  3/19/2007  | 
Securent is a Sponsor Member of the Organization for the Advancement of Structured Information Standards (OASIS)
Secure Stage
News  |  3/16/2007  | 
IT has to get certain details right if they expect users to take security seriously
MEGA Intros Platform
News  |  3/16/2007  | 
MEGA introduced customers of its GRC Platform, a comprehensive enterprise-wide solution for corporate governance
St. Bernard Stops Skyriver Spam
News  |  3/16/2007  | 
St. Bernard announced that Skyriver Communications has deployed LivePrism throughout its organization and to selected customers
Oracle Preps Security Features for 11g
News  |  3/16/2007  | 
Enhancements to database will focus on encryption, compliance
Black Hat Woman
News  |  3/16/2007  | 
Researcher Joanna Rutkowska talks stealth malware, driving tests, and classical music
<<   <   Page 2 / 5   >   >>

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.