News & Commentary

Content posted in September 2006
Page 1 / 4   >   >>
Users, IT in Privacy 'Arms Race'
News  |  9/29/2006  | 
Users bring anonymous browsing tools to work, evoking the ire of IT departments
Demystifying Data Forensics
News  |  9/29/2006  | 
Companies to evaluate their data storage in preparation of court appearances
Splunk, WildPackets Integrate
News  |  9/29/2006  | 
WildPackets announced integration between the WildPackets OmniAnalysis Platform and the Splunk Server
Hacker: Researchers at Risk
News  |  9/29/2006  | 
From one hacker to another: Watch your back
Six Charged in AOL Phishing Scam
News  |  9/28/2006  | 
Department of Justice alleges fraud conspiracy by attackers in Connecticut
eEye Offers Free IPS Client
News  |  9/28/2006  | 
eEye Digital Security has quietly begun distributing a free Blink home version, which also lets the company gather attack data
Deconstructing Vista
News  |  9/28/2006  | 
A battle is forming over what security capabilities Microsoft's new operating system should have, but Microsoft should ultimately be allowed to make that call
Symantec Intros Mail Security
News  |  9/28/2006  | 
Symantec announced Symantec Mail Security with Premium AntiSpam for Windows Small Business Server
Novell Joins Alliance
News  |  9/28/2006  | 
Novell has joined the SAP Global Security Alliance to deliver a combined solution that addresses risk management and IT security
Multivendor Management Locked Up
News  |  9/28/2006  | 
Key management partnerships have yet to deliver the goods
HD Moore Unplugged
News  |  9/28/2006  | 
Security researcher HD Moore talks about how he got into the biz, Microsoft, and what it's like to be a security rock star
HR: ROADM Market Primed to Boom
News  |  9/27/2006  | 
Revenues are on track to exceed $250 million in 2006 as big network operators install ROADMs to deliver IPTV service, Heavy Reading projects
IT Pros Wrestle With Ethics
News  |  9/27/2006  | 
Preliminary results of Dark Reading's survey show that the rules aren't always well-defined, or followed, in the data center
Colubris Gets Secure
News  |  9/27/2006  | 
WiFi vendor releases access point for wireless intrusion detection and prevention marketplace
Two Vendors Deny XSS Flaws
News  |  9/27/2006  | 
Despite last week's hacker postings, Acunetix and F5 say their Websites don't have XSS vulnerabilities
Fortent Appoints CTO
News  |  9/27/2006  | 
Fortent announced the appointment of Kay LaBare as Chief Technology Officer
Websense, PortAuthority Partner
News  |  9/27/2006  | 
Websense announced plans to deliver new technology to control the unwanted dissemination of sensitive and confidential information
MarkMonitor Extends Trust Guard
News  |  9/27/2006  | 
MarkMonitor announced the availability of Trust Guard for Financial Services
Sophos Intros Solutions
News  |  9/27/2006  | 
Sophos launched new Application Control features that allow system admins to selectively block unauthorized VOIP, P2P, IM applications
Gartner Identifies Threat
News  |  9/27/2006  | 
Gartner has included obfuscation as part of their recommended strategy to reduce the risk of app vulnerability probing, IP theft
Six Hot Security Products
News  |  9/26/2006  | 
All security products are hot these days, but here are six that could fry an egg - or maybe a hacker
Spammers Attack IT
News  |  9/26/2006  | 
A new wave of spam attacks uses 'IT-speak' to escape filters and fool data center staff
AppSec Opens in UK
News  |  9/26/2006  | 
Application Security announced the opening of its first regional sales and operations center in the UK
Cyber-Ark Posts Results
News  |  9/26/2006  | 
Cyber-Ark announces the surprising results of its 2006 Privileged Password Survey
CipherOptics Launches Solution
News  |  9/26/2006  | 
CipherOptics announces the general availability of the CipherOptics SG10G-B
Butler Praises CRYPTOCard
News  |  9/26/2006  | 
CRYPTOCard is proud to announce that its CRYPTO-Server two-factor authentication solution has received high praise from Butler Group
Cybertrust Touts Program
News  |  9/26/2006  | 
Cybertrust announced the launch of its Partner Security Program
Financial Firms Losing Data
News  |  9/26/2006  | 
Researcher finds financial institutions have lost data more than universities, and via lost laptops
Hackers Target Consumers
News  |  9/25/2006  | 
Two new studies show consumers still clueless about computer security, and hungry attackers putting them high on the menu
ISPs Needed in Botnet Battle
News  |  9/25/2006  | 
More botnet-fighting tools and services are emerging for ISPs, but critics say ISPs have stayed on the fence too long
Infocrossing Rolls Out Service
News  |  9/25/2006  | 
Infocrossing announced the introduction of iConnection 6.0
ForeScout Intros CounterACT 6.0
News  |  9/25/2006  | 
ForeScout Technologies announced the release of CounterACT 6.0 and the addition of two new products to the CounterACT family
Breach Gets Thinking Stone
News  |  9/25/2006  | 
Breach Security announced the acquisition of Thinking Stone
Agnitum Reports on 4.0
News  |  9/25/2006  | 
Over 50,000 computer users from around the world have downloaded the release candidate of Outpost Firewall Pro 4.0
Kaspersky Joins TNC
News  |  9/25/2006  | 
Kaspersky announced that they are joining the TCG to support the Trusted Network Connect open standards
Columbitech Adds to Solution
News  |  9/25/2006  | 
Columbitech announced that its Wireless VPN solution includes support for Symbian OS 9.1
ContactWorks Picks Passface
News  |  9/25/2006  | 
ContactWorks has selected Passfaces cognometric authentication solution to provide an additional layer of security
Trend Micro Adds Protection
News  |  9/25/2006  | 
Trend Micro announced its next milestone in content security innovation with the release of InterCloud Security Service
PortAuthority Closes Round
News  |  9/25/2006  | 
PortAuthority Technologies announced it has closed its latest round of funding, raising approximately $18 million
Bioscrypt Intros Software
News  |  9/25/2006  | 
Bioscrypt announced the release of the latest version of its VeriSoft Access Manager software application
Quick, Encrypt Everything!
Commentary  |  9/22/2006  | 
On the surface, it seems like a good idea. Convert all your corporate information into a form unreadable by anyone except the intended recipient. Very straightforward and not terribly difficult to do. But there's a dark side to encryption. Just like anesthesiologists like to joke that putting you under is free, it's waking you up that costs so much money, decrypting your data is the part of the process where things get hairy. In this era of epidemically stolen and lost laptops and mobile devices
How Are Your Security Scruples?
News  |  9/22/2006  | 
Take our latest survey on personal and professional ethics, and how you'd react to some highly-charged security situations
XSS Crossover
News  |  9/22/2006  | 
Bitten by our own scoop yesterday, hackers showed us Dark Reading had the same XSS vulnerability we reported on
Endeavor Sweetens the Honeynet
News  |  9/22/2006  | 
Security service creates signatures for IDS/IPS vendors as well as honeypot outsourcing option for enterprises
Apple Issues Security Alert
News  |  9/22/2006  | 
Firm warns on three WiFi driver flaws that could enable Intel and PowerPC hijacks
ZERT Issues 'Stopgap' IE Patch
News  |  9/22/2006  | 
Nonprofit group steps in as latest Internet Explorer attack spreads and users await Microsoft's official patch
EPL Uncovers Malice
News  |  9/22/2006  | 
Thousands in Australia affected, malicious eGreetings now being spammed to inboxes around the world
Interop Posts Results
News  |  9/21/2006  | 
Executive results of Interop survey
Hurd to Speak on Leak Probe
News  |  9/21/2006  | 
Suggestions CEO had role in investigations alters HP's strategy for handling scandal
Most Popular Trojans
News  |  9/21/2006  | 
Banker, Downloader are most common, but the spam-borne malware is getting more prolific, targeted, and profitable
Page 1 / 4   >   >>


12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.