Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in June 2006
<<   <   Page 3 / 4   >   >>
MessageLabs Adds EIM
News  |  6/12/2006  | 
MessageLabs announced the launch of its Enterprise Instant Messenger (EIM) Service
Reactivity Adds XML Solution
News  |  6/12/2006  | 
Reactivity unveiled the industry's first network-based comprehensive XML-enabled networking solutions
Red Seal Gathers Up Risk Data
News  |  6/12/2006  | 
Less predictive in nature, the risk management box is supposed to help improve decision making when things go wrong
5 Open-Source Security Tools For Your Arsenal
Commentary  |  6/9/2006  | 
In the movies, hacking is glamorous. A few lines of code, a little pen testing, and you're in. You don't need to cast Angelina Jolie (Hackers) or Hugh Jackman (Swordfish) to portray hacking as it truly is: a game of patience and persistence that's mostly trial and error, heavy emphasis on the "error." Assuming no prior knowledge of a system an attacker seeks to penetrate, hacking is done in stages. The attacker is a digital gumshoe pounding the electronic pavement in search of any
Microsoft Prepares to Patch Things Up
News  |  6/9/2006  | 
Microsoft gave a heads up on its latest security updates for Windows, IE, Office, and Exchange
Flaw Found in Linux Statistics App
News  |  6/9/2006  | 
Cross-site scripting vulnerability in a popular Linux log file app could lead to remote code execution
UTM Protects Children
News  |  6/9/2006  | 
Bullard Independent School District's Technology Director Lee Sleeper installed Lightspeed System's Total Traffic Control v6.0 in Mar '06
Chicago Exchange Buys Into SIM
News  |  6/9/2006  | 
Security information management application from TriGeo helps the Chicago Stock Exchange stretch its tiny IT staff
Futbol, You Bet
News  |  6/9/2006  | 
IT security managers are kind of like goalkeepers when it comes to protecting their networks and their companies from attacks and exploits
Sophos Method Used to Crack Trojan
News  |  6/8/2006  | 
The spyware tool in Sophos's new Endpoint Security product was built on the same 'genotyping' tech used to crack this week's 'ransomware' Trojan
Exploit Shares Results
News  |  6/8/2006  | 
Exploit Prevention Labs released findings from monthly survey to measure the rise of Internet-borne exploits and zero-day attacks
Deep-Packet Offerings Proliferate
News  |  6/8/2006  | 
Ellacoya, Sandvine join Allot in launching new tools for deep packet inspection
Vulnerability Crosses Browser Boundaries
News  |  6/8/2006  | 
A newly-reported flaw makes Internet Explorer and Mozilla browsers equally vulnerable
Two Charged in VOIP Hacking Scandal
News  |  6/8/2006  | 
Authorities say two men ran a wholesale VOIP business using allegedly fake codes to load call traffic onto unsuspecting VOIP networks
Cisco Names Chairman
News  |  6/8/2006  | 
Cisco Systems adopted a board chairmanship succession plan
Credibility On Trial
Commentary  |  6/7/2006  | 
There are two high-profile trials going on this week, both testing the credibility of IT security.
New Service Seeks Out Security Gaps
News  |  6/7/2006  | 
SekCheck has launched a new service that audits security infrastructures and compares them against those of other enterprises
Allot Goes Deep on Packets
News  |  6/7/2006  | 
Vendor's deep packet inspection lets service providers track user behavior
Rendezvous at Risk
News  |  6/7/2006  | 
Holes in Tibco's Rendezvous messaging middleware can leave applications vulnerable to denial-of-service attacks
Comodo Releases Monkey
News  |  6/7/2006  | 
Comodo announced the immediate availability of NOC Monkey 2.0 beta 1
EMC Nets nLayers, Scopes Security
News  |  6/7/2006  | 
Launches Analyst Day with acquisition announcement and word of more to come
Social Engineering, the USB Way
News  |  6/7/2006  | 
Those thumb drives can turn external threats into internal ones in two easy steps
Healthcare Firms Unite for Safety
News  |  6/7/2006  | 
The newly-formed eHealth Vulnerability Reporting Program brings together major healthcare companies in an effort to identify and eliminate security threats
At MedAvant, Security Helps Pay the Bills
News  |  6/7/2006  | 
Healthcare billing and payment processing company implements PortAuthority software to stop unauthorized traffic
NCircle, Cybertrust Team Up
News  |  6/6/2006  | 
Cybertrust will offer nCircle's vulnerability and risk management solutions and use nCircle IP360 profiling and scanning technology in its portfolio of services
Microsoft's Crossbow a Draw in 2007?
News  |  6/6/2006  | 
Analysts expect enterprise email and security updates in the next Windows Mobile operating system
Microsoft Serves Up Security Services
News  |  6/6/2006  | 
Live Labs services hit developer hot buttons like authentication and peer-to-peer apps
StillSecure, Patchlink Partner
News  |  6/6/2006  | 
StillSecure partners with Patchlink to simplify end-to-end vulnerability lifecycle management
Vendors Fix Snort Flaws
News  |  6/6/2006  | 
VigilantMinds and Sourcefire discover and fix flaw in Snort, an open source intrusion prevention system
CyberSource Tackles Data Theft
News  |  6/6/2006  | 
New CyberSource service protects merchants and consumers from payment data theft
Availl Hops Network Engines
News  |  6/6/2006  | 
Software startup signs OEM deal with security appliance vendor as WAFS momentum grows
DESL Releases Admin Tool
News  |  6/6/2006  | 
Data Encryption Systems has released an Administrator's Tool for its DESlock+ data encryption software
Wireless Requires Flexibility, Security
News  |  6/6/2006  | 
Commercial mortgage exec warns not to overlook users' needs
Nortel Reports Q1
News  |  6/6/2006  | 
Nortel Networks Corporation announced that it and its principal operating subsidiary Nortel Networks
File Security Gets All Cryptic
News  |  6/5/2006  | 
Vendors target file-level encryption and key management in an attempt to lock down users' data
NCircle Debuts MSSP
News  |  6/5/2006  | 
NCircle announced today the debut of its Managed Security Service Provider (MSSP) Program
Find & Seek?
News  |  6/5/2006  | 
Mobile phone records can reveal more about you than just what numbers you called
RSA's Master Key Plans
News  |  6/5/2006  | 
Lack of simple, centralized management for issuing and revoking keys has been a key obstacle to wider use of encryption
TeamF1, AMCC Team Up
News  |  6/5/2006  | 
TeamF1 and AMCC announced expanded support of TeamF1's secure networking solutions on AMCC's PowerPC family
Privacy Networks Intros Search
News  |  6/5/2006  | 
Privacy Networks announced that its PrivacyVault secure email archiving system is available as a component of its EIS Version 5.1
Ping Releases ID Mgmt Gear
News  |  6/5/2006  | 
Ping Identity Corporation announced today that PingFederate 4 is now available for free download from www.pingidentity.com
AppSec Eases Compliance
News  |  6/5/2006  | 
Application Security announced best-practice policies to help government organizations meet FISMA requirements
Lancope Digs Into User Behavior
News  |  6/5/2006  | 
New user identity tracking capabilities will open up new security troubleshooting opportunities, vendor says
Lancope Intros StealthWatch 5.5
News  |  6/5/2006  | 
Lancope announced StealthWatch System 5.5, a system-wide upgrade
Third Brigade Enhances IPS
News  |  6/5/2006  | 
Third Brigade unveiled Deep Security 4.5, the newest release of its advanced intrusion prevention system (IPS)
Postini Integrates Filtering
News  |  6/5/2006  | 
Postini's new Web Content Manager is a secure managed service that provides protection against web-based malware and policy violations
RSA Unveils Data Protection
News  |  6/5/2006  | 
RSA announced an initiative to provide companies with a more comprehensive approach to enterprise data protection (EDP)
PortAuthority: Most Accurate
News  |  6/5/2006  | 
PortAuthority announced the results of the first Leak Prevention Accuracy Test
New PGP Extends Encryption
News  |  6/5/2006  | 
PGP announced PGP NetShare to address one of the greatest security risks facing companies today
Monitoring Employees' Outbound E-Mail Doesn't Make You Big Brother
Commentary  |  6/2/2006  | 
Many of you are deeply involved in privacy initiatives at your company, and you know better than anyone else that it's a very complex and touchy issue, and that it can be hard to find credible information that helps you achieve those important objectives. And while I wish it were otherwise, the nonsense that many media outlets pump out about this critical subject makes it easy for me to understand why so many people don't trust journalists as much as they used to--or even at all. This isn't an e
<<   <   Page 3 / 4   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-19
An issue was discovered in Delta RM 1.2. It is possible for an unprivileged user to access the same information as an admin user regarding the risk creation information in the /risque/administration/referentiel/json/create/categorie endpoint, using the id_cat1 query parameter to indicate the risk.
PUBLISHED: 2022-01-19
There is an integer overflow in the ION driver &quot;/dev/ion&quot; of Allwinner R818 SoC Android Q SDK V1.0 that could use the ioctl cmd &quot;COMPAT_ION_IOC_SUNXI_FLUSH_RANGE&quot; to cause a system crash (denial of service).
PUBLISHED: 2022-01-19
jpress v4.2.0 allows users to register an account by default. With the account, user can upload arbitrary files to the server.
PUBLISHED: 2022-01-19
An issue was discovered in webp_server_go 0.4.0. There is a directory traversal vulnerability that can read arbitrary file information on the server.
PUBLISHED: 2022-01-19
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise ...