Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in August 2006
Page 1 / 4   >   >>
New Browser Hides User Behavior
News  |  8/31/2006  | 
Browzar flushes cache, history, and cookies as soon as the user closes the application
App Proxies: No Reviving the Dream
News  |  8/31/2006  | 
Application proxies stir up fond memories of more enterprise control, but chances of resurgence are slim
Bioscrypt Gets Qualification
News  |  8/31/2006  | 
Bioscrypt announced that its fingerprint algorithms have been qualified by the GSA
IPS Technology: Ready for Overhaul
News  |  8/31/2006  | 
Its current limitations might be frustrating, but IPS technology will evolve into smarter, more integrated security solution
Wireless Piggybackers Put on Notice
News  |  8/30/2006  | 
New California law encourages users to lock up WLANs, setting the stage for criminal action against hackers and piggybackers
RFID: Readily Fooled Indeed
News  |  8/30/2006  | 
'Guardian' detects and spoofs tags and readers, and has thrown into question RFID security and cost assumptions
Hacking Home WLANs
News  |  8/30/2006  | 
Don't forget to lock down your users' home WLANs
How Identity Theft Works
News  |  8/30/2006  | 
Ever wonder how hard it is to steal a person's identity? We did it in this penetration test, and we were surprised at just how easy it is
Top 10 Reasons Security Products Don't Work
News  |  8/29/2006  | 
Once users and vendors get past the finger-pointing, there's a lot they can do together to improve enterprise security
Authentium Warns
News  |  8/29/2006  | 
Authentium issued a warning against trusting free wireless access points located in airports and other public places
CipherOptics Removes Barriers
News  |  8/29/2006  | 
CipherOptics is poised to launch the industry's first 10 Gig IPsec encryption solution
V.i. Labs Intro Method
News  |  8/29/2006  | 
V.i. Laboratories announced a new method for quantifying revenue
When to Disclose
News  |  8/29/2006  | 
Researchers, vendors try to strike 'artful balance' between alerts and the actual patches for new bugs
AT&T Admits Hacking Breach
News  |  8/29/2006  | 
AT&T said that unauthorized persons illegally hacked into a computer system and accessed personal data
Tripwire for Servers
News  |  8/29/2006  | 
Tripwire announced the latest version of Tripwire for Servers and Tripwire Manager
Insecure at the Airport?
News  |  8/29/2006  | 
Five ways to make your concourse WiFi experience more secure
FaceTime Ups Archiving
News  |  8/29/2006  | 
FaceTime announced new capabilities for the safe and productive use of enterprise IM across distributed organizations
NextHop, AirTight Partner
News  |  8/29/2006  | 
NextHop and AirTight announced a marketing and technology partnership providing enhanced security and performance management
Nokia to Offer IPS
News  |  8/29/2006  | 
Nokia announces plans to offer Sourcefire's IPS on its portfolio of high-performance IP Security Platforms
A Lesson Plan For The Department Of Education
Commentary  |  8/28/2006  | 
Another week, another preventable exposure of citizen data at a government agency. Last week's spillage in the spotlight came courtesy of the U.S. Department of Education. A glitch in a new software program created a situation where the wrong client data was being shown to people trying to update their student loan accounts. After a number of complaints, the ED shut down the affected Web pages. Then, apparen
Study: Rethink the Outsider Threat
News  |  8/28/2006  | 
DOJ data turns conventional wisdom on its head: Biggest enterprise threat is more than likely external
Metasploit Issues New Beta
News  |  8/28/2006  | 
Second beta of bug-discovery tool Metasploit 3.0 fixes Windows glitch, adds multi-host feature
Blue Coat Speeds Up
News  |  8/28/2006  | 
Blue Coat is releasing new appliance hardware models offering throughput performance increases
Synaptics Intros SecurePad
News  |  8/28/2006  | 
Synaptics announced the introduction of SecurePad, a new biometric TouchPad created especially for notebooks
Ponemon Unveils Study
News  |  8/28/2006  | 
Nearly two-thirds of security executives believe they have no way to prevent a data breach, according to the latest industry research
Oakley Intros Solution
News  |  8/28/2006  | 
Oakley Networks announced the immediate availability of CoreView, the company's network-based behavioral analysis solution
Holes Remain in SSL VPNs
News  |  8/25/2006  | 
SSL VPN products have gotten more secure in the past year, but the technology still isn't safe when users log on via third-party machines
Cisco Reports New Vulnerabilities
News  |  8/25/2006  | 
Firewalls, VPN 3000 Concentrator are at risk and in need of a fix, networking giant says
IMS, SDP Revolutionize OSS
News  |  8/25/2006  | 
The emergence of IMS and SDP technologies is having a profound effect on the OSS sector, according Light Reading
What Customers Really Want
News  |  8/25/2006  | 
Listen. Show that you care. Make my needs matter. Geez, this is starting to sound like a relationship
Fighting Fire With Fire
News  |  8/24/2006  | 
Everyone has a spam revenge fantasy. What's yours?
IBM Merger Gets Mixed Responses
News  |  8/24/2006  | 
Raise prices? Win more outsourced security? IBM-ISS deal leaves many wondering what Big Blue will do with its new prize
Fighting Spam With Spamalot
News  |  8/24/2006  | 
New software engages human side of spammers, dragging out correspondence and flooding them with duped messages and replies
Credit Union Taps Comodo
News  |  8/24/2006  | 
Indiana based FORUM Credit Union is deploying Comodo's S.A.F.E. solution to protect members from phishing and pharming attacks
NetOp Tech Launches 9.0
News  |  8/24/2006  | 
NetOp Tech launched its latest software product for IT remote control in the United States
Sophos Offers Free Tool
News  |  8/24/2006  | 
Sophos announced a new free-of-charge, standalone tool offering comprehensive rootkit detection and removal capabilities
Click Goes Your Ad Budget
News  |  8/23/2006  | 
Who's clicking on your company's Web ads? It's tough to tell the bots from prospective customers
Enterprises Still Not Sweet on Honeypots
News  |  8/23/2006  | 
Passive technology lacks preventive capability but might prove useful for tracking malicious internal activity
Debix Researches ID Theft
News  |  8/23/2006  | 
Debix announced new research showing forty percent of Fraud Alerts are not set properly
CryptoCard Betters Access
News  |  8/23/2006  | 
CRYPTOCard launches CRYPTO-Server 6.4
IBM Up-Ends Security Services Market
News  |  8/23/2006  | 
IBM's $1.3 billion buyout of ISS may signal large enterprises are more willing to embrace managed security services
Standard Could Unify Security Apps
News  |  8/22/2006  | 
ArcSight's proposed standards for log management, event reporting could get security apps onto the same page
Click Fraud: What IT Should Know
News  |  8/22/2006  | 
As fraud grows, more marketing execs are asking IT to ascertain who's really clicking online ads
IE Patch Created New Vulnerability
News  |  8/22/2006  | 
Patch issued earlier this month for Internet Explorer inadvertently introduced new hole
AirDefense Gets Patent
News  |  8/22/2006  | 
AirDefense announced that the USPTO awarded US Patent No. 7,086,089 titled 'Systems and Methods for Network Security' to AirDefense
PowerPoint Trojan: Not Zero Day
News  |  8/22/2006  | 
The new PowerPoint Trojan that baffled researchers yesterday targets a known vulnerability
Bell, ESoft Partner
News  |  8/22/2006  | 
ESoft announced that it has recently signed a distribution agreement with Bell Microproducts
Intellinx, IDI Combat Threat
News  |  8/21/2006  | 
Intellinx, Information Design announced the launch of a campaign to promote the Intellinx solution for insider threat protection
Fiberlink Protects
News  |  8/21/2006  | 
Fiberlink Communications announced Fiberlink Managed Information Protection
Cognio Does WiFi, RFID
News  |  8/21/2006  | 
Cognio announced a new version of Spectrum Expert that makes quick work of troubleshooting and eliminating physical layer problems
Page 1 / 4   >   >>


97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I told you we should worry abit more about vendor lock-in.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .