Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in September 2007
<<   <   Page 3 / 5   >   >>
WatchGuard Enhances UTM
News  |  9/19/2007  | 
WatchGuard releases update to heuristic zero-day protection engine
Bit9 Adds Whitelisting to Parity
News  |  9/19/2007  | 
Bit9 enables superior endpoint protection platform with the launch of Parity 4.0
Utimaco Supports IntelPro
News  |  9/18/2007  | 
Utimaco provides enterprise key and policy management for next-generation Intel vPro Technology
New Attacks Target Top Executives
News  |  9/18/2007  | 
Trojan-style attack designed to fool CXOs into downloading data-sucking malware, researcher says
Rethinking Vulnerabilities
News  |  9/18/2007  | 
In an increasingly networked world, it's time to take a closer look at distributed systems security
Service Uses Cell for Authentication
News  |  9/18/2007  | 
Positive Networks releases PhoneFactor for free
nCircle Compliant With FISMA & FDCC
News  |  9/18/2007  | 
nCircle announces availability of Federal Desktop Core Configuration (FDCC) policies integrated with nCircle Configuration Compliance Manager
CITTIO, eIQnetworks Partner
News  |  9/18/2007  | 
CITTIO partners with eIQnetworks to add security and compliance capabilities to its network and systems monitoring platform
Government Prodding Biometrics into the Mainstream?
Commentary  |  9/18/2007  | 
Biometrics has been a market segment that seems to under perform consistently. To date, use of the technology has limited to select applications, such as securing laptops, but Uncle Sam may soon help to change that.
SWsoft to Deliver Comodo Tools
News  |  9/18/2007  | 
Comodo announces agreement with SWsoft to deliver infrastructure automation and security solutions
Bioscrypt's V-Station MIFARE on TSA List
News  |  9/18/2007  | 
Bioscrypt's V-Station MIFARE placed on Transportation Security Administration's Qualified Products List
SecureDoc Earns BITS Certification
News  |  9/18/2007  | 
WinMagic's SecureDoc certified by the financial services industry to protect all data on desktops, laptops, and mobile devices
Maynor Releases Apple Wireless Bug Code
News  |  9/18/2007  | 
Over a year after the Apple wireless flap, researcher David Maynor publishes a paper with proof-of-concept of the controversial hack
F5 Rolls Out New SSL VPN Version
News  |  9/18/2007  | 
F5 Networks introduces application ready access with new release of FirePass SSL VPN controller
BigFix Fixes Mid-Sized Security
News  |  9/18/2007  | 
BigFix announces availability of BigFix EndPoint Defender
A Security Primer for the Average Joe
Quick Hits  |  9/18/2007  | 
'Security Mike' wants to help Grandma and the kids lock down their PCs and get rid of their commercial AV software
AirTran Airways Adds Tool for PCI
News  |  9/18/2007  | 
AirTran Airways uses Lancope's StealthWatch Network Behavior Analysis System to help demonstrate PCI compliance
Cybercrime Gets More Organized
Commentary  |  9/17/2007  | 
The increasingly organized -- and commoditized -- nature of cybercrime should make all of us more alert than ever to the risks our information, and our customers' information, face on our networks.
Lawsuit Raises Questions on TD Ameritrade Breach
News  |  9/17/2007  | 
May class action suit suggests brokerage firm knew about breach as far back as November but didn't disclose it
First on the Scene
News  |  9/17/2007  | 
Making sure your 'first responders' are trained to properly handle a data breach is key to preserving evidence
Imperva Joins PCI Security Standards Council
News  |  9/17/2007  | 
Application data security and compliance leader lends support to help promote PCI DSS adoption and compliance
Symark Adds AD Authentication for Linux, Unix
News  |  9/17/2007  | 
Symark Software introduces PowerADvantage to extend active directory functionality to UNIX and Linux systems
nCircle Expands Discovery Capabilities
News  |  9/17/2007  | 
nCircle expands discovery capabilities to provide industry's broadest and deepest intelligence on enterprise networks
IBM X-Force Report: Exploit-Leasing Popular
News  |  9/17/2007  | 
Exploit leasing surfaces from underground, trojans become most popular malware
New AirTight IPS Protects WEP
News  |  9/17/2007  | 
AirTight offers industry's first and only proactive WEP protection
Spam Likely to Hit TD Ameritrade Victims
News  |  9/17/2007  | 
Sophos is warning the TD Ameritrade's customers to be on red alert against targeted spam emails
Report: Attacks on ISP Nets Intensifying
News  |  9/17/2007  | 
Gigabit-speed sustained attacks on the rise, and botnets are now the number one threat to ISP backbones
Layer 7 Intros SecureSpan XML PIP
News  |  9/17/2007  | 
Layer 7 Technologies introduces the Securespan XML Policy Integration Point for cross domain solutions
For Sale on EBay: Your Data
Quick Hits  |  9/17/2007  | 
Many companies leave sensitive data on recycled and donated hard drives, study says
Sourcefire Launches First-Ever Adaptive IPS
News  |  9/17/2007  | 
Sourcefire announces general availability of Sourcefire 3D System 4.7
Study: Healthcare Must Do More to Protect Records
News  |  9/17/2007  | 
Industry leaders join forces to address information security concerns
Don't Do As TD Ameritrade Does -- And Don't Do As They Say, Either
Commentary  |  9/14/2007  | 
The security breach that let spammers get hold of as many as 6.3 million TD Ameritrade customer names, phone numbers and e-mail addresses is being spun as a "Well, they didn't get Social Security numbers, account numbers, PINs or other confidential info; still we apologize for any inconvenience or annoyance," sort of problem. Mistake. Big mistake.
Privaris Announces Webinar
News  |  9/14/2007  | 
Privaris announces webinar to introduce a new approach to biometrics for network and physical security
Security Spending: In the Red?
News  |  9/14/2007  | 
The costs of cybercrime are increasing. Are companies budgeting enough to defend themselves?
TD Ameritrade Breach Affects 6.3M Customers
News  |  9/14/2007  | 
Brokerage firm uncovers data-sucking malware during system audit
Top Five Security Tools for Mac OS X
News  |  9/14/2007  | 
There are plenty of cool tools and options for securing the MacBook Pro
Current Analysis Gives Bradford High Marks
News  |  9/14/2007  | 
Seventy-eight percent of customers would look to Bradford for future NAC investments
Study: Automated Key Management Use on Rise
News  |  9/14/2007  | 
An Aberdeen study states that companies are increasingly invest in automated key management
Important Lessons We Learn From 'Star Trek'
Quick Hits  |  9/14/2007  | 
A clever techie offers a plethora of sage wisdom from Kirk, Spock, and friends - and the inspirational posters to remember it with
How to Bypass the IDS/IPS
News  |  9/14/2007  | 
'Simple Nomad' shows how bad guys can wage targeted attacks by probing, fingerprinting IDSes and IPSes
Mu Security Discovers Zero-Day Bug
News  |  9/14/2007  | 
Mu Security discovers zero-day Quagga bgpd Remote Denial of Service Vulnerability
Mobile Insecurity
News  |  9/14/2007  | 
It's just a matter of time before mobile devices fall victim to new - and major - exploits
QuickTime Patch Procrastination Poses Firefox Problems
Commentary  |  9/13/2007  | 
Said it before, say it again: Bad enough to have flawed and vulnerable software out there, but probably unavoidable as code gets more and more complex. Completely unavoidable and equally inexcusable is letting a known vulnerability languish for any amount of time, much less a full year. Yet that's exactly what Apple's done with a QuickTime media player security hole that's been known of for at least that long.
Quantum Research Could Threaten Encryption Schemes
News  |  9/13/2007  | 
New quantum computers implement algorithm capable of cracking most current encryption codes
Security's Dirty Little Secret
News  |  9/13/2007  | 
Why you need to measure the long-term impact of security
Email Encryption Gets Easier
News  |  9/13/2007  | 
But are these new methods enough to convince enterprises to secure their messages with in-house systems - or that they even need to?
Dell Rolls Out New Secure Notebooks
News  |  9/13/2007  | 
Dell delivers the world's most secure commercial notebooks
Mi5 Networks Names VP Sales
News  |  9/13/2007  | 
Mi5 Networks names Tom Orella vice president of sales and business development
Anti-Spam Unconstitutional?
Quick Hits  |  9/13/2007  | 
Convicted spammer's attorney says Virginia's law ban of spam impinges on freedom of 'anonymous' speech
Top 10 Tips for Managing Software Piracy
News  |  9/13/2007  | 
Uniloc releases top 10 software licensing strategies for managing piracy
<<   <   Page 3 / 5   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.
PUBLISHED: 2021-10-15
Yealink Device Management (DM) allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
PUBLISHED: 2021-10-15
IBM Cognos Analytics 11.1.7 and 11.2.0 contains locally cached browser data, that could allow a local attacker to obtain sensitive information.
PUBLISHED: 2021-10-15
Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h in stb 2.26 via a crafted JPEG file.