Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in August 2007
Page 1 / 4   >   >>
Phishers Play Top 40
News  |  8/31/2007  | 
Latest spam pretends to be video from your favorite musical artist
Oracle Buys Another ID Company
News  |  8/31/2007  | 
Oracle purchases Bridgestream, its fifth identity and access management acquisition, for $35 million
Bimba Deploys Sidewinder
News  |  8/31/2007  | 
Secure Computing announced that Bimba Manufacturing has switched to the Sidewinder Network Gateway Security appliance
Utimaco Renews NIST Certification
News  |  8/31/2007  | 
Utimaco renews certification in accordance with leading US Security Standard
Mobile Computing Makes For Risky Business
Commentary  |  8/30/2007  | 
Here's one we all already know -- mobile computer users take more security risks than office-bound computer users. A new survey shows just how risky their behavior is.
Virtualization Security Heats Up
News  |  8/30/2007  | 
An attack that breaches the hypervisor is IT's new worst nightmare. Are you prepared?
Stratos Picks SaaS Security
News  |  8/30/2007  | 
Stratos selects Alert Logic to provide IT network security
When Web Servers Attack
News  |  8/30/2007  | 
Even in a DMZ, a Web server can be a dangerous weapon
Comodo Intros Memory Guardian
News  |  8/30/2007  | 
Comodo introduces Memory Guardian to protect consumers against buffer overflow attacks
Korea Investigates Anti-Spyware Makers
News  |  8/30/2007  | 
Korean government asks police to look into 'anti-spyware' tools that actually spread spyware
Storm Hits Blogger
News  |  8/30/2007  | 
The ubiquitous Storm Trojan has found a new home - on spam blog sites in Google's Blogger network
Small Business Lessons From Big Monster's Big Security SNAFU
Commentary  |  8/29/2007  | 
How you handle news of a security breach can be as important to your business as how you handle the breach itself. And how you handle perception of your handling ranks just as high.
On the Trail of 'Fast Flux' Botnets
News  |  8/29/2007  | 
Stealth botnet method makes botnets hard to kill, but not impossible
Texas School Expands NAC Deployment
News  |  8/29/2007  | 
Texas school district expands Mirage NAC deployment
Consumers Concerned With Phishing
News  |  8/29/2007  | 
Cloudmark announced the results of a nationwide poll conducted on its behalf by Harris Interactive
PDF Spam Declines Sharply
News  |  8/29/2007  | 
'Is PDF spam simply not working for the spammers?' Sophos asks
Going Green With Security Cuts Costs
News  |  8/29/2007  | 
Secure tokens prove to be the expensive choice for both planet and pocket
Jordan's Furniture Selects Sophos
News  |  8/29/2007  | 
Jordan's Furniture selected Sophos Endpoint Security and Control
Certicamara Selects SafeNet Tokens
News  |  8/29/2007  | 
SafeNet tokens to secure digital identities, critical business information and transactions throughout Colombia
Most Small Businesses Are Security Over-Confident
Commentary  |  8/28/2007  | 
That's what a new study says, anyway -- 80 percent of small to midsize businesses don't block (or, by implication, monitor) employee use of computers for file-sharing or use of USB devices, three-quarters allow unfettered Instant Messenging, nearly half don't even have spyware controls installed, and a staggering percentage don't regularly update what security software they do have. Yet most feel confident that their companies are protected.
Enterprises Wrestle With Security Policies
News  |  8/28/2007  | 
Corporate security policies often are not enforced, according to newly-published survey by RSA and Forrester
'Dream Team' Takes on Black Hats
News  |  8/28/2007  | 
Feds, law enforcement, ISPs, and researchers pow-wow in closed meeting on how to catch the bad guys
Black Hat's Video Review
News  |  8/28/2007  | 
One-on-one interviews offer a new view on Black Hat's key issues
AirMagnet Achieves FIPS Certification
News  |  8/28/2007  | 
AirMagnet says it's the first wireless intrusion detection vendor to achieve FIPS certification
Promisec Helps SMEs Combat Security Threats
News  |  8/28/2007  | 
SMEs need to address internal threats, leverage automation to ensure highest levels of security and threat mitigation
IM Threats Spike Nearly 100% in August
News  |  8/28/2007  | 
Akonix IM Threat Watch tracks 38 attacks
Trend Micro Reveals Risky Mobile Behaviors
News  |  8/28/2007  | 
Trend Micro study assesses the impact of mobility on corporate end-user behavior
Sophos: Don't Download That YouTube Video
News  |  8/28/2007  | 
New variation of Storm worm drops Ecard disguise for online movie masquerade
CIOs: ID Management, Authorization Are Key
News  |  8/28/2007  | 
Need for de-perimeterization solutions gaining ground among global leaders
Merchant-Accounts.ca, Comodo Partner
News  |  8/28/2007  | 
Merchant-Accounts.ca and Comodo announce partnership to deliver PCI compliance and Web vulnerability scanning to Canadian customers
Biopharmaceutical Co. Picks 3D Face Readers
News  |  8/28/2007  | 
Bioscrypt VisionAccess 3D Face Readers meet unique needs of pharmaceutical industry
Infoblox Acquires Ipanto
News  |  8/28/2007  | 
Infoblox has acquired Ipanto, IP address management innovator
Symantec Launches Norton 2008
News  |  8/28/2007  | 
Symantec announced the launch of Norton Internet Security 2008 and Norton AntiVirus 2008
CO Rec Center Fuses IT, Physical Security
News  |  8/28/2007  | 
CDW Government helps Parker, Colo., fuse IT and physical security in new sports center
Talking Trash
Commentary  |  8/27/2007  | 
Shred up those papers and that trash! Or crooks can grab your business cash! And identities, trade secrets and anything else that's not micro-shredded or broken down into its component atoms.
China's Premier 'Gravely Concerned' by Hack on Germany
News  |  8/27/2007  | 
Top-ranked officials discuss alleged cyber attack at diplomatic meeting
Courion Logs Record Gains
News  |  8/27/2007  | 
Courion announced record performance for the first half of 2007, including a nearly 40% increase in revenue
Arcot Systems Names New CFO
News  |  8/27/2007  | 
Arcot Systems announced that David E. Kaplan has been named as its new chief financial officer, effective immediately
ForeScout Partners With Canadian VAR
News  |  8/27/2007  | 
ForeScout Technologies announced that it has signed a VAR agreement with Conexsys Communications
Fortinet Adds UTM for Small Offices
News  |  8/27/2007  | 
Fortinet introduced the FortiGate-60B and the FortiWifi-60B, two high-performance, full-featured multi-threat security appliances
New Intel Processor Fights Rootkits, Virtualization Threats
News  |  8/27/2007  | 
But experts say new features still aren't true anti-rootkit technologies
Study: SMBs Overconfident in IT Security
News  |  8/27/2007  | 
According to Websense, SMBs fail to take adequate steps to reduce the risk off data loss from Web-based security threats
Anchiva Delivers 800,000 Signatures
News  |  8/27/2007  | 
Rapid RxLabs is now delivering over 800,000 signatures to detect and prevent malware from entering enterprise networks
Advice On Building A Better Password
Commentary  |  8/24/2007  | 
We're always hearing that we need stronger passwords, but many people don't know how to craft a better, stronger password or they simply don't take the time to come up with some crazy complex string that they have no chance of remembering. I was just talking with someone who gave me some great advice.
Weathering The Weather
Commentary  |  8/24/2007  | 
Watch the news coverage of the Midwest floods and the toll they've taken on families, homes and holdings, and you can't avoid hearing -- and often -- from flood victims who discovered that their insurance didn't cover flood or landslide/mudslide damage. It's no great leap to extend those personal stories to small and mid-size business stories. How covered are you when a natural disaster strikes your business?
Phishers in Microsoft's Clothing
News  |  8/24/2007  | 
Two new spam scams masquerade as official messages from top Microsoft officials
Red Curtain Reveals Malware
News  |  8/24/2007  | 
Free tool helps expose malicious software by its behavior
The Lost Companies
News  |  8/24/2007  | 
Security troubles lead to disappearance of two established organizations in two months
Utimaco Unveils New Encryption Tool
News  |  8/24/2007  | 
Utimaco unveiled its new SafeGuard PrivateDisk 2.02, a tool for the encryption of files and folders in virtual devices
A Monster Of A Security Problem
Commentary  |  8/23/2007  | 
Ever hire anybody via Monster.com? Ever look for a job there yourself? You may have an identity problem.
Page 1 / 4   >   >>


97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I told you we should worry abit more about vendor lock-in.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .