News & Commentary

Content posted in September 2006
Page 1 / 4   >   >>
Users, IT in Privacy 'Arms Race'
News  |  9/29/2006  | 
Users bring anonymous browsing tools to work, evoking the ire of IT departments
Demystifying Data Forensics
News  |  9/29/2006  | 
Companies to evaluate their data storage in preparation of court appearances
Splunk, WildPackets Integrate
News  |  9/29/2006  | 
WildPackets announced integration between the WildPackets OmniAnalysis Platform and the Splunk Server
Hacker: Researchers at Risk
News  |  9/29/2006  | 
From one hacker to another: Watch your back
Six Charged in AOL Phishing Scam
News  |  9/28/2006  | 
Department of Justice alleges fraud conspiracy by attackers in Connecticut
eEye Offers Free IPS Client
News  |  9/28/2006  | 
eEye Digital Security has quietly begun distributing a free Blink home version, which also lets the company gather attack data
Deconstructing Vista
News  |  9/28/2006  | 
A battle is forming over what security capabilities Microsoft's new operating system should have, but Microsoft should ultimately be allowed to make that call
Symantec Intros Mail Security
News  |  9/28/2006  | 
Symantec announced Symantec Mail Security with Premium AntiSpam for Windows Small Business Server
Novell Joins Alliance
News  |  9/28/2006  | 
Novell has joined the SAP Global Security Alliance to deliver a combined solution that addresses risk management and IT security
Multivendor Management Locked Up
News  |  9/28/2006  | 
Key management partnerships have yet to deliver the goods
HD Moore Unplugged
News  |  9/28/2006  | 
Security researcher HD Moore talks about how he got into the biz, Microsoft, and what it's like to be a security rock star
HR: ROADM Market Primed to Boom
News  |  9/27/2006  | 
Revenues are on track to exceed $250 million in 2006 as big network operators install ROADMs to deliver IPTV service, Heavy Reading projects
IT Pros Wrestle With Ethics
News  |  9/27/2006  | 
Preliminary results of Dark Reading's survey show that the rules aren't always well-defined, or followed, in the data center
Colubris Gets Secure
News  |  9/27/2006  | 
WiFi vendor releases access point for wireless intrusion detection and prevention marketplace
Two Vendors Deny XSS Flaws
News  |  9/27/2006  | 
Despite last week's hacker postings, Acunetix and F5 say their Websites don't have XSS vulnerabilities
Fortent Appoints CTO
News  |  9/27/2006  | 
Fortent announced the appointment of Kay LaBare as Chief Technology Officer
Websense, PortAuthority Partner
News  |  9/27/2006  | 
Websense announced plans to deliver new technology to control the unwanted dissemination of sensitive and confidential information
MarkMonitor Extends Trust Guard
News  |  9/27/2006  | 
MarkMonitor announced the availability of Trust Guard for Financial Services
Sophos Intros Solutions
News  |  9/27/2006  | 
Sophos launched new Application Control features that allow system admins to selectively block unauthorized VOIP, P2P, IM applications
Gartner Identifies Threat
News  |  9/27/2006  | 
Gartner has included obfuscation as part of their recommended strategy to reduce the risk of app vulnerability probing, IP theft
Six Hot Security Products
News  |  9/26/2006  | 
All security products are hot these days, but here are six that could fry an egg - or maybe a hacker
Spammers Attack IT
News  |  9/26/2006  | 
A new wave of spam attacks uses 'IT-speak' to escape filters and fool data center staff
AppSec Opens in UK
News  |  9/26/2006  | 
Application Security announced the opening of its first regional sales and operations center in the UK
Cyber-Ark Posts Results
News  |  9/26/2006  | 
Cyber-Ark announces the surprising results of its 2006 Privileged Password Survey
CipherOptics Launches Solution
News  |  9/26/2006  | 
CipherOptics announces the general availability of the CipherOptics SG10G-B
Butler Praises CRYPTOCard
News  |  9/26/2006  | 
CRYPTOCard is proud to announce that its CRYPTO-Server two-factor authentication solution has received high praise from Butler Group
Cybertrust Touts Program
News  |  9/26/2006  | 
Cybertrust announced the launch of its Partner Security Program
Financial Firms Losing Data
News  |  9/26/2006  | 
Researcher finds financial institutions have lost data more than universities, and via lost laptops
Hackers Target Consumers
News  |  9/25/2006  | 
Two new studies show consumers still clueless about computer security, and hungry attackers putting them high on the menu
ISPs Needed in Botnet Battle
News  |  9/25/2006  | 
More botnet-fighting tools and services are emerging for ISPs, but critics say ISPs have stayed on the fence too long
Infocrossing Rolls Out Service
News  |  9/25/2006  | 
Infocrossing announced the introduction of iConnection 6.0
ForeScout Intros CounterACT 6.0
News  |  9/25/2006  | 
ForeScout Technologies announced the release of CounterACT 6.0 and the addition of two new products to the CounterACT family
Breach Gets Thinking Stone
News  |  9/25/2006  | 
Breach Security announced the acquisition of Thinking Stone
Agnitum Reports on 4.0
News  |  9/25/2006  | 
Over 50,000 computer users from around the world have downloaded the release candidate of Outpost Firewall Pro 4.0
Kaspersky Joins TNC
News  |  9/25/2006  | 
Kaspersky announced that they are joining the TCG to support the Trusted Network Connect open standards
Columbitech Adds to Solution
News  |  9/25/2006  | 
Columbitech announced that its Wireless VPN solution includes support for Symbian OS 9.1
ContactWorks Picks Passface
News  |  9/25/2006  | 
ContactWorks has selected Passfaces cognometric authentication solution to provide an additional layer of security
Trend Micro Adds Protection
News  |  9/25/2006  | 
Trend Micro announced its next milestone in content security innovation with the release of InterCloud Security Service
PortAuthority Closes Round
News  |  9/25/2006  | 
PortAuthority Technologies announced it has closed its latest round of funding, raising approximately $18 million
Bioscrypt Intros Software
News  |  9/25/2006  | 
Bioscrypt announced the release of the latest version of its VeriSoft Access Manager software application
Quick, Encrypt Everything!
Commentary  |  9/22/2006  | 
On the surface, it seems like a good idea. Convert all your corporate information into a form unreadable by anyone except the intended recipient. Very straightforward and not terribly difficult to do. But there's a dark side to encryption. Just like anesthesiologists like to joke that putting you under is free, it's waking you up that costs so much money, decrypting your data is the part of the process where things get hairy. In this era of epidemically stolen and lost laptops and mobile devices
How Are Your Security Scruples?
News  |  9/22/2006  | 
Take our latest survey on personal and professional ethics, and how you'd react to some highly-charged security situations
XSS Crossover
News  |  9/22/2006  | 
Bitten by our own scoop yesterday, hackers showed us Dark Reading had the same XSS vulnerability we reported on
Endeavor Sweetens the Honeynet
News  |  9/22/2006  | 
Security service creates signatures for IDS/IPS vendors as well as honeypot outsourcing option for enterprises
Apple Issues Security Alert
News  |  9/22/2006  | 
Firm warns on three WiFi driver flaws that could enable Intel and PowerPC hijacks
ZERT Issues 'Stopgap' IE Patch
News  |  9/22/2006  | 
Nonprofit group steps in as latest Internet Explorer attack spreads and users await Microsoft's official patch
EPL Uncovers Malice
News  |  9/22/2006  | 
Thousands in Australia affected, malicious eGreetings now being spammed to inboxes around the world
Interop Posts Results
News  |  9/21/2006  | 
Executive results of Interop survey
Hurd to Speak on Leak Probe
News  |  9/21/2006  | 
Suggestions CEO had role in investigations alters HP's strategy for handling scandal
Most Popular Trojans
News  |  9/21/2006  | 
Banker, Downloader are most common, but the spam-borne malware is getting more prolific, targeted, and profitable
Page 1 / 4   >   >>


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15473
PUBLISHED: 2018-08-17
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2018-15471
PUBLISHED: 2018-08-17
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or c...
CVE-2018-6622
PUBLISHED: 2018-08-17
An issue was discovered that affects all producers of BIOS firmware who make a certain realistic interpretation of an obscure portion of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2.0 specification. An abnormal case is not handled properly by this firmware while S3 sleep and can...
CVE-2018-14057
PUBLISHED: 2018-08-17
Pimcore before 5.3.0 allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging validation of the X-pimcore-csrf-token anti-CSRF token only in the "Settings > Users / Roles" function.
CVE-2018-14058
PUBLISHED: 2018-08-17
Pimcore before 5.3.0 allows SQL Injection via the REST web service API.