Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in August 2006
Page 1 / 4   >   >>
New Browser Hides User Behavior
News  |  8/31/2006  | 
Browzar flushes cache, history, and cookies as soon as the user closes the application
App Proxies: No Reviving the Dream
News  |  8/31/2006  | 
Application proxies stir up fond memories of more enterprise control, but chances of resurgence are slim
Bioscrypt Gets Qualification
News  |  8/31/2006  | 
Bioscrypt announced that its fingerprint algorithms have been qualified by the GSA
IPS Technology: Ready for Overhaul
News  |  8/31/2006  | 
Its current limitations might be frustrating, but IPS technology will evolve into smarter, more integrated security solution
Wireless Piggybackers Put on Notice
News  |  8/30/2006  | 
New California law encourages users to lock up WLANs, setting the stage for criminal action against hackers and piggybackers
RFID: Readily Fooled Indeed
News  |  8/30/2006  | 
'Guardian' detects and spoofs tags and readers, and has thrown into question RFID security and cost assumptions
Hacking Home WLANs
News  |  8/30/2006  | 
Don't forget to lock down your users' home WLANs
How Identity Theft Works
News  |  8/30/2006  | 
Ever wonder how hard it is to steal a person's identity? We did it in this penetration test, and we were surprised at just how easy it is
Top 10 Reasons Security Products Don't Work
News  |  8/29/2006  | 
Once users and vendors get past the finger-pointing, there's a lot they can do together to improve enterprise security
Authentium Warns
News  |  8/29/2006  | 
Authentium issued a warning against trusting free wireless access points located in airports and other public places
CipherOptics Removes Barriers
News  |  8/29/2006  | 
CipherOptics is poised to launch the industry's first 10 Gig IPsec encryption solution
V.i. Labs Intro Method
News  |  8/29/2006  | 
V.i. Laboratories announced a new method for quantifying revenue
When to Disclose
News  |  8/29/2006  | 
Researchers, vendors try to strike 'artful balance' between alerts and the actual patches for new bugs
AT&T Admits Hacking Breach
News  |  8/29/2006  | 
AT&T said that unauthorized persons illegally hacked into a computer system and accessed personal data
Tripwire for Servers
News  |  8/29/2006  | 
Tripwire announced the latest version of Tripwire for Servers and Tripwire Manager
Insecure at the Airport?
News  |  8/29/2006  | 
Five ways to make your concourse WiFi experience more secure
FaceTime Ups Archiving
News  |  8/29/2006  | 
FaceTime announced new capabilities for the safe and productive use of enterprise IM across distributed organizations
NextHop, AirTight Partner
News  |  8/29/2006  | 
NextHop and AirTight announced a marketing and technology partnership providing enhanced security and performance management
Nokia to Offer IPS
News  |  8/29/2006  | 
Nokia announces plans to offer Sourcefire's IPS on its portfolio of high-performance IP Security Platforms
A Lesson Plan For The Department Of Education
Commentary  |  8/28/2006  | 
Another week, another preventable exposure of citizen data at a government agency. Last week's spillage in the spotlight came courtesy of the U.S. Department of Education. A glitch in a new software program created a situation where the wrong client data was being shown to people trying to update their student loan accounts. After a number of complaints, the ED shut down the affected Web pages. Then, apparen
Study: Rethink the Outsider Threat
News  |  8/28/2006  | 
DOJ data turns conventional wisdom on its head: Biggest enterprise threat is more than likely external
Metasploit Issues New Beta
News  |  8/28/2006  | 
Second beta of bug-discovery tool Metasploit 3.0 fixes Windows glitch, adds multi-host feature
Blue Coat Speeds Up
News  |  8/28/2006  | 
Blue Coat is releasing new appliance hardware models offering throughput performance increases
Synaptics Intros SecurePad
News  |  8/28/2006  | 
Synaptics announced the introduction of SecurePad, a new biometric TouchPad created especially for notebooks
Ponemon Unveils Study
News  |  8/28/2006  | 
Nearly two-thirds of security executives believe they have no way to prevent a data breach, according to the latest industry research
Oakley Intros Solution
News  |  8/28/2006  | 
Oakley Networks announced the immediate availability of CoreView, the company's network-based behavioral analysis solution
Holes Remain in SSL VPNs
News  |  8/25/2006  | 
SSL VPN products have gotten more secure in the past year, but the technology still isn't safe when users log on via third-party machines
Cisco Reports New Vulnerabilities
News  |  8/25/2006  | 
Firewalls, VPN 3000 Concentrator are at risk and in need of a fix, networking giant says
IMS, SDP Revolutionize OSS
News  |  8/25/2006  | 
The emergence of IMS and SDP technologies is having a profound effect on the OSS sector, according Light Reading
What Customers Really Want
News  |  8/25/2006  | 
Listen. Show that you care. Make my needs matter. Geez, this is starting to sound like a relationship
Fighting Fire With Fire
News  |  8/24/2006  | 
Everyone has a spam revenge fantasy. What's yours?
IBM Merger Gets Mixed Responses
News  |  8/24/2006  | 
Raise prices? Win more outsourced security? IBM-ISS deal leaves many wondering what Big Blue will do with its new prize
Fighting Spam With Spamalot
News  |  8/24/2006  | 
New software engages human side of spammers, dragging out correspondence and flooding them with duped messages and replies
Credit Union Taps Comodo
News  |  8/24/2006  | 
Indiana based FORUM Credit Union is deploying Comodo's S.A.F.E. solution to protect members from phishing and pharming attacks
NetOp Tech Launches 9.0
News  |  8/24/2006  | 
NetOp Tech launched its latest software product for IT remote control in the United States
Sophos Offers Free Tool
News  |  8/24/2006  | 
Sophos announced a new free-of-charge, standalone tool offering comprehensive rootkit detection and removal capabilities
Click Goes Your Ad Budget
News  |  8/23/2006  | 
Who's clicking on your company's Web ads? It's tough to tell the bots from prospective customers
Enterprises Still Not Sweet on Honeypots
News  |  8/23/2006  | 
Passive technology lacks preventive capability but might prove useful for tracking malicious internal activity
Debix Researches ID Theft
News  |  8/23/2006  | 
Debix announced new research showing forty percent of Fraud Alerts are not set properly
CryptoCard Betters Access
News  |  8/23/2006  | 
CRYPTOCard launches CRYPTO-Server 6.4
IBM Up-Ends Security Services Market
News  |  8/23/2006  | 
IBM's $1.3 billion buyout of ISS may signal large enterprises are more willing to embrace managed security services
Standard Could Unify Security Apps
News  |  8/22/2006  | 
ArcSight's proposed standards for log management, event reporting could get security apps onto the same page
Click Fraud: What IT Should Know
News  |  8/22/2006  | 
As fraud grows, more marketing execs are asking IT to ascertain who's really clicking online ads
IE Patch Created New Vulnerability
News  |  8/22/2006  | 
Patch issued earlier this month for Internet Explorer inadvertently introduced new hole
AirDefense Gets Patent
News  |  8/22/2006  | 
AirDefense announced that the USPTO awarded US Patent No. 7,086,089 titled 'Systems and Methods for Network Security' to AirDefense
PowerPoint Trojan: Not Zero Day
News  |  8/22/2006  | 
The new PowerPoint Trojan that baffled researchers yesterday targets a known vulnerability
Bell, ESoft Partner
News  |  8/22/2006  | 
ESoft announced that it has recently signed a distribution agreement with Bell Microproducts
Intellinx, IDI Combat Threat
News  |  8/21/2006  | 
Intellinx, Information Design announced the launch of a campaign to promote the Intellinx solution for insider threat protection
Fiberlink Protects
News  |  8/21/2006  | 
Fiberlink Communications announced Fiberlink Managed Information Protection
Cognio Does WiFi, RFID
News  |  8/21/2006  | 
Cognio announced a new version of Spectrum Expert that makes quick work of troubleshooting and eliminating physical layer problems
Page 1 / 4   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-0652
PUBLISHED: 2021-10-22
In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitati...
CVE-2021-0702
PUBLISHED: 2021-10-22
In RevertActiveSessions of apexd.cpp, there is a possible way to share the wrong file due to an unintentional MediaStore downgrade. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: An...
CVE-2021-0703
PUBLISHED: 2021-10-22
In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Pr...
CVE-2021-0705
PUBLISHED: 2021-10-22
In sanitizeSbn of NotificationManagerService.java, there is a possible way to keep service running in foreground and keep granted permissions due to Bypass of Background Service Restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User intera...
CVE-2021-0706
PUBLISHED: 2021-10-22
In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersi...