Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in June 2006
Page 1 / 4   >   >>
Our Data Isn't Secure, So What Are We Going To Do About It?
Commentary  |  6/30/2006  | 
One of the great things about my job is that there's never a shortage of things to do. This is especially the case when it comes to covering data security. Before the ink is dry on one story about a stolen laptop or breached database, I find another one to cover. But this troubling trend isn't just a case of "good-for-me-bad-for-you." I, too, have been ensnared in the web of identity theft and data breaches. Where is all this going, and what have we learned?
7 Lessons From IT Security Trial
Commentary  |  6/30/2006  | 
Over the last several weeks, InformationWeek has been covering the trial of a former UBS PaineWebber systems administrator, Roger Duronio, who's accused of writing and setting off a highly destructive logic bomb at his former employer as revenge for not receiving the maximum yearly bonus. The government prosecution contends that Duronio was not only looking to wreak havoc, but also to profit by purchasing securities whose valu
Dark Vacation
News  |  6/30/2006  | 
Dark Reading takes off July 3-4, and you should too
Saying 'No' to WiFi
News  |  6/30/2006  | 
Right next door to a Starbucks, Blue Cross of Idaho looks to Network Chemistry for an 802.11 lockdown
Enterprises Getting Soft on Security
News  |  6/30/2006  | 
Security losses are down, and so's IT security spending. Are enterprises setting themselves up for a nasty fall?
Did EMC Overpay?
News  |  6/30/2006  | 
The $2.1 billion for RSA shows EMC is serious about security but raises questions about price, integration challenges
Users Welcome Super-Deal
News  |  6/30/2006  | 
EMC's RSA acquisition appears to resonate well with IT pros
Windows Flaw, Word Trojan Found
News  |  6/30/2006  | 
Microsoft is looking into another possible Windows hole, and a new Trojan rides in on Word docs
EMC Secures RSA for $2.1B
News  |  6/29/2006  | 
EMC and RSA enter marriage of storage and security UPDATED 5:55 PM
Group to Research ID Theft
News  |  6/29/2006  | 
Universities, law enforcement agencies, and vendors team to study fraud and identity theft
Foundry Intros SecureIron
News  |  6/29/2006  | 
Foundry Networks announced the new SecureIron Perimeter Traffic Manager devices to augment perimeter security
SafeNet Adds to ranks
News  |  6/29/2006  | 
SafeNet announced the appointment of J. Carter Beese Jr. to its Board of Directors and John W. Frederick as Vice President
RSA Acknowledges Secret Suitor
News  |  6/29/2006  | 
The two vendors are rumored to be talking a marriage of storage and security
Cisco Issues WCS Warning
News  |  6/29/2006  | 
WiFi management platform turns up with a handful of vulnerabilities
Sentillion Offers Secure Virtualization
News  |  6/29/2006  | 
Sentillion, the leading provider of identity and access management solutions for the healthcare industry, today unveiled vThere
Hifn Cuts 22%
News  |  6/28/2006  | 
Hifn announced a series of actions today that are intended to accelerate Hifn's return to profitability
Cisco Seeks to Fill Security Gaps
News  |  6/28/2006  | 
Gaps between security products, and between IT and business groups, cause enterprise headaches, says Cisco's security CTO
BEW Offers Solutions
News  |  6/28/2006  | 
BEW Global implemented solutions to address HIPAA compliance concerns within The Portland Clinic and Longmont United Hospital
Lifespan Taps Vericept
News  |  6/28/2006  | 
Lifespan has selected The Vericept 360 degrees Risk Management Platform to protect sensitive patient health information and organization data
Warning Users of Dangerous Clicks
News  |  6/28/2006  | 
MarkMonitor's buyout of Collective Trust could allow ISPs to warn users about dangerous clicks ahead
Fearsome Decade
News  |  6/28/2006  | 
Escalation in sophistication and type of attacks means it's only a matter of time before you're a target
MarkMonitor Gets Collective Trust
News  |  6/28/2006  | 
MarkMonitor acquired CollectiveTrust to add their Zero-Hour fraud protection technology to MarkMonitor's anti-fraud solutions
Fortress, Nortel Team
News  |  6/28/2006  | 
Fortress and Nortel have formed a strategic relationship to provide government agencies worldwide with a joint solution
Upping The Ante On Data Collection
Commentary  |  6/27/2006  | 
So much about the overall issue and recent incidents of data loss are astounding, it's hard to know where to start. One good place is the Privacy Rights Clearinghouse, which offers up some sobering statistics on stolen data: Since Feb. 15, 2005 there has been over 200 data breaches (with some companies starring as repeat offenders) affecting the data of 88,399,953 individuals. At least - that's what's been report
Demons Lurk in Management Software
News  |  6/27/2006  | 
Systems management software may be the weakest link in the enterprise, according to researchers from Matasano Security
Mu Security Lands $10M
News  |  6/27/2006  | 
Mu Security has raised an additional $10 million in a Series B funding round
AppSec Rolls Out Tool
News  |  6/27/2006  | 
Application Security announced immediate availability of a new PCI-DSS Toolkit
Startup Locks Down Apps
News  |  6/27/2006  | 
Firewall pioneer Pensak is behind another venture intent on hardening applications where they live
SafeNet Updates
News  |  6/27/2006  | 
SafeNet announced a major upgrade of the industry-leading QuickSec IPSec VPN product line
Broadcom Debuts RFID
News  |  6/27/2006  | 
Broadcom Corporation introduced the world's first secure processor with integrated radio frequency identification (RFID) technology
Oversight Releases Survey
News  |  6/27/2006  | 
Companies are embracing the concept of enterprise risk management but continue to struggle with implementation
Mu Security Lands $10M
News  |  6/27/2006  | 
Mu Security announced the company has raised an additional $10 million in a Series B funding round
Symantec Bundles Security Services
News  |  6/26/2006  | 
Threat and Vulnerability Management Program blends security alerts with consulting
Fraud Monitoring Appliance on Tap
News  |  6/26/2006  | 
Cydelity appliance gives banks a detailed look at suspicious account activity
Symantec Streamlines Security Biz
News  |  6/26/2006  | 
Cuts investment in its hardware business amid plans for next-gen security software
GraniteEdge Updates ESP
News  |  6/26/2006  | 
GraniteEdge announced its latest release of GraniteEdge ESP - the only solution that automatically visualizes network behavior
MessageLabs Unveils Services
News  |  6/26/2006  | 
MessageLabs announced the launch of version 2.0 of its Web Security Services
Lockdown Joins Microsoft Program
News  |  6/26/2006  | 
Lockdown announced the launch of its open iNAC architecture
Iron Mountain Adds Protection
News  |  6/26/2006  | 
Iron Mountain introduced the PC Data Protection Suite
Datamonitor Lauds Crypto
News  |  6/26/2006  | 
A new technology report titled has acknowledged Cryptomathic as 'a leading supplier of strong security solutions'
Sensory, Vendors Partner
News  |  6/26/2006  | 
Sensory unveiled the industry's largest ecosystem of applications designed to run on Sensory's NodalCore acceleration platform
CSI/FBI: Small Firms Pay Big For Security
News  |  6/23/2006  | 
The per-user cost of security is much higher in small enterprises than in large ones, according to the forthcoming annual survey from the Computer Security Institute and the FBI
Phish Bait
News  |  6/23/2006  | 
A security company is testing the effects of a phishing exploit that comes from inside the corporate network
Blue Coat Grabs NetApp's NetCache
News  |  6/23/2006  | 
Proxy vendor Blue Coat eliminates a prime competitor by gaining funding and buying the NetCache Web content and security appliance line from Network Appliance for $23 million
Data Loss Epidemic
News  |  6/23/2006  | 
Data losses at major corporations and government agencies are being reported almost every day now
Data Losses Hit Four More
News  |  6/22/2006  | 
The list of big-name organizations reporting security breaches just keeps growing
Bit9 Recants Flaw
News  |  6/22/2006  | 
Bit9 issued a report announcing what it found to be the top 15 applications with known vulnerabilities
Vericept Upgrades Platform
News  |  6/22/2006  | 
Vericept announced version 8.0 of the Vericept 360 Risk Management Platform
No Easy Fix for Branch Office Blues
News  |  6/22/2006  | 
Branch offices spell IT trouble, says Arun Taneja, and need an 'arsenal' to fix things
Enterprise FMC's a Win-Win
News  |  6/22/2006  | 
Enterprise-focused FMC initiatives could have a major positive impact on wireless carriers finds the latest report Unstrung Insider
Page 1 / 4   >   >>


Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.