News & Commentary

Content posted in August 2007
Page 1 / 4   >   >>
Phishers Play Top 40
News  |  8/31/2007  | 
Latest spam pretends to be video from your favorite musical artist
Oracle Buys Another ID Company
News  |  8/31/2007  | 
Oracle purchases Bridgestream, its fifth identity and access management acquisition, for $35 million
Bimba Deploys Sidewinder
News  |  8/31/2007  | 
Secure Computing announced that Bimba Manufacturing has switched to the Sidewinder Network Gateway Security appliance
Utimaco Renews NIST Certification
News  |  8/31/2007  | 
Utimaco renews certification in accordance with leading US Security Standard
Mobile Computing Makes For Risky Business
Commentary  |  8/30/2007  | 
Here's one we all already know -- mobile computer users take more security risks than office-bound computer users. A new survey shows just how risky their behavior is.
Virtualization Security Heats Up
News  |  8/30/2007  | 
An attack that breaches the hypervisor is IT's new worst nightmare. Are you prepared?
Stratos Picks SaaS Security
News  |  8/30/2007  | 
Stratos selects Alert Logic to provide IT network security
When Web Servers Attack
News  |  8/30/2007  | 
Even in a DMZ, a Web server can be a dangerous weapon
Comodo Intros Memory Guardian
News  |  8/30/2007  | 
Comodo introduces Memory Guardian to protect consumers against buffer overflow attacks
Korea Investigates Anti-Spyware Makers
News  |  8/30/2007  | 
Korean government asks police to look into 'anti-spyware' tools that actually spread spyware
Storm Hits Blogger
News  |  8/30/2007  | 
The ubiquitous Storm Trojan has found a new home - on spam blog sites in Google's Blogger network
Small Business Lessons From Big Monster's Big Security SNAFU
Commentary  |  8/29/2007  | 
How you handle news of a security breach can be as important to your business as how you handle the breach itself. And how you handle perception of your handling ranks just as high.
On the Trail of 'Fast Flux' Botnets
News  |  8/29/2007  | 
Stealth botnet method makes botnets hard to kill, but not impossible
Texas School Expands NAC Deployment
News  |  8/29/2007  | 
Texas school district expands Mirage NAC deployment
Consumers Concerned With Phishing
News  |  8/29/2007  | 
Cloudmark announced the results of a nationwide poll conducted on its behalf by Harris Interactive
PDF Spam Declines Sharply
News  |  8/29/2007  | 
'Is PDF spam simply not working for the spammers?' Sophos asks
Going Green With Security Cuts Costs
News  |  8/29/2007  | 
Secure tokens prove to be the expensive choice for both planet and pocket
Jordan's Furniture Selects Sophos
News  |  8/29/2007  | 
Jordan's Furniture selected Sophos Endpoint Security and Control
Certicamara Selects SafeNet Tokens
News  |  8/29/2007  | 
SafeNet tokens to secure digital identities, critical business information and transactions throughout Colombia
Most Small Businesses Are Security Over-Confident
Commentary  |  8/28/2007  | 
That's what a new study says, anyway -- 80 percent of small to midsize businesses don't block (or, by implication, monitor) employee use of computers for file-sharing or use of USB devices, three-quarters allow unfettered Instant Messenging, nearly half don't even have spyware controls installed, and a staggering percentage don't regularly update what security software they do have. Yet most feel confident that their companies are protected.
Enterprises Wrestle With Security Policies
News  |  8/28/2007  | 
Corporate security policies often are not enforced, according to newly-published survey by RSA and Forrester
'Dream Team' Takes on Black Hats
News  |  8/28/2007  | 
Feds, law enforcement, ISPs, and researchers pow-wow in closed meeting on how to catch the bad guys
Black Hat's Video Review
News  |  8/28/2007  | 
One-on-one interviews offer a new view on Black Hat's key issues
AirMagnet Achieves FIPS Certification
News  |  8/28/2007  | 
AirMagnet says it's the first wireless intrusion detection vendor to achieve FIPS certification
Promisec Helps SMEs Combat Security Threats
News  |  8/28/2007  | 
SMEs need to address internal threats, leverage automation to ensure highest levels of security and threat mitigation
IM Threats Spike Nearly 100% in August
News  |  8/28/2007  | 
Akonix IM Threat Watch tracks 38 attacks
Trend Micro Reveals Risky Mobile Behaviors
News  |  8/28/2007  | 
Trend Micro study assesses the impact of mobility on corporate end-user behavior
Sophos: Don't Download That YouTube Video
News  |  8/28/2007  | 
New variation of Storm worm drops Ecard disguise for online movie masquerade
CIOs: ID Management, Authorization Are Key
News  |  8/28/2007  | 
Need for de-perimeterization solutions gaining ground among global leaders, Comodo Partner
News  |  8/28/2007  | and Comodo announce partnership to deliver PCI compliance and Web vulnerability scanning to Canadian customers
Biopharmaceutical Co. Picks 3D Face Readers
News  |  8/28/2007  | 
Bioscrypt VisionAccess 3D Face Readers meet unique needs of pharmaceutical industry
Infoblox Acquires Ipanto
News  |  8/28/2007  | 
Infoblox has acquired Ipanto, IP address management innovator
Symantec Launches Norton 2008
News  |  8/28/2007  | 
Symantec announced the launch of Norton Internet Security 2008 and Norton AntiVirus 2008
CO Rec Center Fuses IT, Physical Security
News  |  8/28/2007  | 
CDW Government helps Parker, Colo., fuse IT and physical security in new sports center
Talking Trash
Commentary  |  8/27/2007  | 
Shred up those papers and that trash! Or crooks can grab your business cash! And identities, trade secrets and anything else that's not micro-shredded or broken down into its component atoms.
China's Premier 'Gravely Concerned' by Hack on Germany
News  |  8/27/2007  | 
Top-ranked officials discuss alleged cyber attack at diplomatic meeting
Courion Logs Record Gains
News  |  8/27/2007  | 
Courion announced record performance for the first half of 2007, including a nearly 40% increase in revenue
Arcot Systems Names New CFO
News  |  8/27/2007  | 
Arcot Systems announced that David E. Kaplan has been named as its new chief financial officer, effective immediately
ForeScout Partners With Canadian VAR
News  |  8/27/2007  | 
ForeScout Technologies announced that it has signed a VAR agreement with Conexsys Communications
Fortinet Adds UTM for Small Offices
News  |  8/27/2007  | 
Fortinet introduced the FortiGate-60B and the FortiWifi-60B, two high-performance, full-featured multi-threat security appliances
New Intel Processor Fights Rootkits, Virtualization Threats
News  |  8/27/2007  | 
But experts say new features still aren't true anti-rootkit technologies
Study: SMBs Overconfident in IT Security
News  |  8/27/2007  | 
According to Websense, SMBs fail to take adequate steps to reduce the risk off data loss from Web-based security threats
Anchiva Delivers 800,000 Signatures
News  |  8/27/2007  | 
Rapid RxLabs is now delivering over 800,000 signatures to detect and prevent malware from entering enterprise networks
Advice On Building A Better Password
Commentary  |  8/24/2007  | 
We're always hearing that we need stronger passwords, but many people don't know how to craft a better, stronger password or they simply don't take the time to come up with some crazy complex string that they have no chance of remembering. I was just talking with someone who gave me some great advice.
Weathering The Weather
Commentary  |  8/24/2007  | 
Watch the news coverage of the Midwest floods and the toll they've taken on families, homes and holdings, and you can't avoid hearing -- and often -- from flood victims who discovered that their insurance didn't cover flood or landslide/mudslide damage. It's no great leap to extend those personal stories to small and mid-size business stories. How covered are you when a natural disaster strikes your business?
Phishers in Microsoft's Clothing
News  |  8/24/2007  | 
Two new spam scams masquerade as official messages from top Microsoft officials
Red Curtain Reveals Malware
News  |  8/24/2007  | 
Free tool helps expose malicious software by its behavior
The Lost Companies
News  |  8/24/2007  | 
Security troubles lead to disappearance of two established organizations in two months
Utimaco Unveils New Encryption Tool
News  |  8/24/2007  | 
Utimaco unveiled its new SafeGuard PrivateDisk 2.02, a tool for the encryption of files and folders in virtual devices
A Monster Of A Security Problem
Commentary  |  8/23/2007  | 
Ever hire anybody via Ever look for a job there yourself? You may have an identity problem.
Page 1 / 4   >   >>

How Cybercriminals Clean Their Dirty Money
Alexon Bell, Global Head of AML & Compliance, Quantexa,  1/22/2019
Facebook Shuts Hundreds of Russia-Linked Pages, Accounts for Disinformation
Sara Peters, Senior Editor at Dark Reading,  1/17/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's not that smart. He's running iOS 11 on a 5c."
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-01-24
An issue was discovered in UC Berkeley RISE Opaque before 2018-12-01. There is no boundary check on ocall_malloc. The return value could be a pointer to enclave memory. It could cause an arbitrary enclave memory write.
PUBLISHED: 2019-01-24
Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the con...
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...