News & Commentary

Content posted in September 2006
Page 1 / 4   >   >>
Users, IT in Privacy 'Arms Race'
News  |  9/29/2006  | 
Users bring anonymous browsing tools to work, evoking the ire of IT departments
Demystifying Data Forensics
News  |  9/29/2006  | 
Companies to evaluate their data storage in preparation of court appearances
Splunk, WildPackets Integrate
News  |  9/29/2006  | 
WildPackets announced integration between the WildPackets OmniAnalysis Platform and the Splunk Server
Hacker: Researchers at Risk
News  |  9/29/2006  | 
From one hacker to another: Watch your back
Six Charged in AOL Phishing Scam
News  |  9/28/2006  | 
Department of Justice alleges fraud conspiracy by attackers in Connecticut
eEye Offers Free IPS Client
News  |  9/28/2006  | 
eEye Digital Security has quietly begun distributing a free Blink home version, which also lets the company gather attack data
Deconstructing Vista
News  |  9/28/2006  | 
A battle is forming over what security capabilities Microsoft's new operating system should have, but Microsoft should ultimately be allowed to make that call
Symantec Intros Mail Security
News  |  9/28/2006  | 
Symantec announced Symantec Mail Security with Premium AntiSpam for Windows Small Business Server
Novell Joins Alliance
News  |  9/28/2006  | 
Novell has joined the SAP Global Security Alliance to deliver a combined solution that addresses risk management and IT security
Multivendor Management Locked Up
News  |  9/28/2006  | 
Key management partnerships have yet to deliver the goods
HD Moore Unplugged
News  |  9/28/2006  | 
Security researcher HD Moore talks about how he got into the biz, Microsoft, and what it's like to be a security rock star
HR: ROADM Market Primed to Boom
News  |  9/27/2006  | 
Revenues are on track to exceed $250 million in 2006 as big network operators install ROADMs to deliver IPTV service, Heavy Reading projects
IT Pros Wrestle With Ethics
News  |  9/27/2006  | 
Preliminary results of Dark Reading's survey show that the rules aren't always well-defined, or followed, in the data center
Colubris Gets Secure
News  |  9/27/2006  | 
WiFi vendor releases access point for wireless intrusion detection and prevention marketplace
Two Vendors Deny XSS Flaws
News  |  9/27/2006  | 
Despite last week's hacker postings, Acunetix and F5 say their Websites don't have XSS vulnerabilities
Fortent Appoints CTO
News  |  9/27/2006  | 
Fortent announced the appointment of Kay LaBare as Chief Technology Officer
Websense, PortAuthority Partner
News  |  9/27/2006  | 
Websense announced plans to deliver new technology to control the unwanted dissemination of sensitive and confidential information
MarkMonitor Extends Trust Guard
News  |  9/27/2006  | 
MarkMonitor announced the availability of Trust Guard for Financial Services
Sophos Intros Solutions
News  |  9/27/2006  | 
Sophos launched new Application Control features that allow system admins to selectively block unauthorized VOIP, P2P, IM applications
Gartner Identifies Threat
News  |  9/27/2006  | 
Gartner has included obfuscation as part of their recommended strategy to reduce the risk of app vulnerability probing, IP theft
Six Hot Security Products
News  |  9/26/2006  | 
All security products are hot these days, but here are six that could fry an egg - or maybe a hacker
Spammers Attack IT
News  |  9/26/2006  | 
A new wave of spam attacks uses 'IT-speak' to escape filters and fool data center staff
AppSec Opens in UK
News  |  9/26/2006  | 
Application Security announced the opening of its first regional sales and operations center in the UK
Cyber-Ark Posts Results
News  |  9/26/2006  | 
Cyber-Ark announces the surprising results of its 2006 Privileged Password Survey
CipherOptics Launches Solution
News  |  9/26/2006  | 
CipherOptics announces the general availability of the CipherOptics SG10G-B
Butler Praises CRYPTOCard
News  |  9/26/2006  | 
CRYPTOCard is proud to announce that its CRYPTO-Server two-factor authentication solution has received high praise from Butler Group
Cybertrust Touts Program
News  |  9/26/2006  | 
Cybertrust announced the launch of its Partner Security Program
Financial Firms Losing Data
News  |  9/26/2006  | 
Researcher finds financial institutions have lost data more than universities, and via lost laptops
Hackers Target Consumers
News  |  9/25/2006  | 
Two new studies show consumers still clueless about computer security, and hungry attackers putting them high on the menu
ISPs Needed in Botnet Battle
News  |  9/25/2006  | 
More botnet-fighting tools and services are emerging for ISPs, but critics say ISPs have stayed on the fence too long
Infocrossing Rolls Out Service
News  |  9/25/2006  | 
Infocrossing announced the introduction of iConnection 6.0
ForeScout Intros CounterACT 6.0
News  |  9/25/2006  | 
ForeScout Technologies announced the release of CounterACT 6.0 and the addition of two new products to the CounterACT family
Breach Gets Thinking Stone
News  |  9/25/2006  | 
Breach Security announced the acquisition of Thinking Stone
Agnitum Reports on 4.0
News  |  9/25/2006  | 
Over 50,000 computer users from around the world have downloaded the release candidate of Outpost Firewall Pro 4.0
Kaspersky Joins TNC
News  |  9/25/2006  | 
Kaspersky announced that they are joining the TCG to support the Trusted Network Connect open standards
Columbitech Adds to Solution
News  |  9/25/2006  | 
Columbitech announced that its Wireless VPN solution includes support for Symbian OS 9.1
ContactWorks Picks Passface
News  |  9/25/2006  | 
ContactWorks has selected Passfaces cognometric authentication solution to provide an additional layer of security
Trend Micro Adds Protection
News  |  9/25/2006  | 
Trend Micro announced its next milestone in content security innovation with the release of InterCloud Security Service
PortAuthority Closes Round
News  |  9/25/2006  | 
PortAuthority Technologies announced it has closed its latest round of funding, raising approximately $18 million
Bioscrypt Intros Software
News  |  9/25/2006  | 
Bioscrypt announced the release of the latest version of its VeriSoft Access Manager software application
Quick, Encrypt Everything!
Commentary  |  9/22/2006  | 
On the surface, it seems like a good idea. Convert all your corporate information into a form unreadable by anyone except the intended recipient. Very straightforward and not terribly difficult to do. But there's a dark side to encryption. Just like anesthesiologists like to joke that putting you under is free, it's waking you up that costs so much money, decrypting your data is the part of the process where things get hairy. In this era of epidemically stolen and lost laptops and mobile devices
How Are Your Security Scruples?
News  |  9/22/2006  | 
Take our latest survey on personal and professional ethics, and how you'd react to some highly-charged security situations
XSS Crossover
News  |  9/22/2006  | 
Bitten by our own scoop yesterday, hackers showed us Dark Reading had the same XSS vulnerability we reported on
Endeavor Sweetens the Honeynet
News  |  9/22/2006  | 
Security service creates signatures for IDS/IPS vendors as well as honeypot outsourcing option for enterprises
Apple Issues Security Alert
News  |  9/22/2006  | 
Firm warns on three WiFi driver flaws that could enable Intel and PowerPC hijacks
ZERT Issues 'Stopgap' IE Patch
News  |  9/22/2006  | 
Nonprofit group steps in as latest Internet Explorer attack spreads and users await Microsoft's official patch
EPL Uncovers Malice
News  |  9/22/2006  | 
Thousands in Australia affected, malicious eGreetings now being spammed to inboxes around the world
Interop Posts Results
News  |  9/21/2006  | 
Executive results of Interop survey
Hurd to Speak on Leak Probe
News  |  9/21/2006  | 
Suggestions CEO had role in investigations alters HP's strategy for handling scandal
Most Popular Trojans
News  |  9/21/2006  | 
Banker, Downloader are most common, but the spam-borne malware is getting more prolific, targeted, and profitable
Page 1 / 4   >   >>


More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.