Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in September 2007
<<   <   Page 4 / 5   >   >>
Company Computers Not Safe At Home
Commentary  |  9/12/2007  | 
A warning from Computer Associates that home computers are increasingly vulnerable and threatened -- surprise! -- set me to wondering how many of those computers aren't really home computers at all, but business computers used at home... and, more critically, used at home by people other than the authorized employee.
Insider Threats Increase, But Damage Is Minimal
News  |  9/12/2007  | 
Annual Computer Security Institute study says employees are the source of most incidents - but not the biggest cost
New Security Awareness Site Gives End Users the Picture
News  |  9/12/2007  | 
Novel new security education site uses cartoons to help users understand phishing, pharming, and malware
Maybe We're Not Ready for Some Football
News  |  9/12/2007  | 
The latest Storm worm come-on targets fantasy football fanatics. How should enterprises respond?
PGP Adds Secure Delivery Options
News  |  9/12/2007  | 
PGP Corporation enables broad range of solutions for secure communications
Klocwork Doubles Customer Base
News  |  9/12/2007  | 
Company doubles customer base, increases new customer revenue by more than 150%
BigFix to Enhance Platform
News  |  9/12/2007  | 
Forthcoming release 7.0 to support significant business continuity functions
Survey: Remote Worker Security Concerns
News  |  9/12/2007  | 
SonicWALL: Managers believe in motivational benefits of remote working but worry about productivity, team bonding and data security
Latest Disease in Hospitals: Identity Loss
Quick Hits  |  9/12/2007  | 
When it comes to laptop theft, medical institutions are getting a rash
Untangle Virtualizes Its Gateway
News  |  9/12/2007  | 
Dedicated machine no longer required to run free alternative to SonicWALL
Vortel Announces 3rd SOA Security Conference
News  |  9/12/2007  | 
Vordel 3rd Annual SOA Security Conference focuses on practical control of SOA
BT Counterpane Launches Service
News  |  9/12/2007  | 
BT Counterpane launches enhanced managed vulnerability scan services
Trend Micro Licenses Third Brigade's Host IDS
News  |  9/12/2007  | 
Trend Micro licenses host intrusion defense technology from third brigade
Do Not Ask Your Customers for Their Social Security Numbers
Commentary  |  9/11/2007  | 
Do you want to make potential and existing customers feel secure? If so, one item that you need to avoid is asking them for their social security numbers. A poll by Consumer Reports National Research found that close to nine of every ten Americans want state and federal lawmakers to pass laws restricting the use of Social Security numbers. So if you want consumers coming back and ordering products
Skype Worm Bubbles Up
Commentary  |  9/11/2007  | 
The latest worm wriggling from Skype (for Windows) user to Skype user by way of the network's chat function gives a good opportunity to remind employees not to click on unexpected messages or images on free VoIPware any more than they should anywhere else.
Annual CSI Study: Cost of Cybercrime Is Skyrocketing
News  |  9/11/2007  | 
Average annual loss per company has more than doubled since last year, according to bellwether study
Network Engines Adds Virtual Appliance Service
News  |  9/11/2007  | 
Network Engines announced the availability of its new Virtual Appliance Solution service
'Virtual' Vulnerabilities About to Become Reality
News  |  9/11/2007  | 
Virtualization bugs may be rare, but they are only the tip of the iceberg
Tor's Privacy Problems
News  |  9/11/2007  | 
Technology developed to protect privacy may actually threaten it
Xirrus Deploys High Density WiFi for ITU
News  |  9/11/2007  | 
Xirrus selected by international telecommunication union for high density WiFi deployment in Geneva
Cyberoam Boosts UTM Solutions
News  |  9/11/2007  | 
Cyberoam announces feature enhancements to strengthen enterprise security
Bioscrypt Launches FIPS-201 Biometric Reader
News  |  9/11/2007  | 
Bioscrypt introduces Biometric Reader to address the evolving needs of the US federal market
BeCrypt Demos Compliance With Juniper
News  |  9/11/2007  | 
BeCrypt to demonstrate 'Secure Access, Trusted Client' capability with Juniper Networks at InfoSec New York
Full-Disk Encryption Grows
News  |  9/11/2007  | 
Group reports the number of organizations protecting sensitive data with encryption is rapidly expanding
Storm Trojan: As Overexposed as Britney
Quick Hits  |  9/11/2007  | 
If your head is about to explode from so many Storm worm sightings, here's a little relief
Botnet Storm Surge: Insecurity In Numbers
Commentary  |  9/10/2007  | 
Whatever the summer heavy weather season has been like in your neck of the woods, the cyber-season saw the explosive growth of a monster security storm. After building strength all year, the Storm botnet worm has created a zombie grid so large that it could be a threat to... pretty much whatever the hackers who created it want it to be a threat to.
Hacking the White House
News  |  9/10/2007  | 
War walk around the President's house exposes some interesting vulnerabilities outside the fence, but solid defenses inside
Why Honeypots Are Sweet
News  |  9/10/2007  | 
Honeypots may not be practical for the enterprise, but you can still learn a lot from them
AirMagnet Announces Survey/Planner 5.0
News  |  9/10/2007  | 
New versions of AirMagnet Survey and AirMagnet Planner automate wireless LAN design and optimization
Privaris, Alacera Partner
News  |  9/10/2007  | 
Alacera to leverage Privaris plusID Personal, wireless biometric technology to provide heightened security for its ID verification module
Breaking Down the Wall
News  |  9/10/2007  | 
US government officials are in a dither about Lenovo's potential acquisition of Seagate. But are any encryption secrets really at risk?
New Tool Helps Secure Kids Online
News  |  9/10/2007  | 
Global Security One advises parents to ensure that they have appropriate systems to protect their children
StillSecure, EDS Partner for Marines
News  |  9/10/2007  | 
StillSecure and EDS announce subcontractor relationship to deliver enterprise-wide solutions to Navy Marine Corps Intranet
A Battery That Runs on What?
Quick Hits  |  9/10/2007  | 
See how Japanese researchers are powering your favorite gadget with your favorite, um, bodily fluid
PatchLink Unveils New Name
News  |  9/10/2007  | 
PatchLink unveils new corporate name: Lumension Security
New Advanced Terrorism Risk Analytics Tool
News  |  9/10/2007  | 
Pitney Bowes MapInfo aligns with exclusive analysis to provide advanced terrorism risk analytics
Sentillion Rolls Out SSO for Healthcare
News  |  9/10/2007  | 
Only healthcare-specific, enterprise-class SSO solution that is low cost, full-featured, and reduces deployment time from months to days
Reading Hospital Chooses SSO
News  |  9/10/2007  | 
The Reading Hospital selects Encentuate for identity and access management
Startup Led by Ex-DHS Cyberchief Rolls Out Forensics Tool
News  |  9/10/2007  | 
NetWitness NextGen analyzes attacks, risks, and verifies compliance
PatchLink Retrenches for IPO With New Name, Products
News  |  9/10/2007  | 
Lumension Security to go head-to-head with CA, McAfee
Bandwidth Is A Business Security Matter, Too
Commentary  |  9/7/2007  | 
The more we can get, the more want to get -- nowhere truer than on the Internet, and getting truer by the day as rich video, audio, effects and extras become an expected part of the traffic. Not just entertainment traffic -- more and more small to midsized businesses are taking advantage of rich media and Web 2.0-ish techniques to send sophisticated sales, marketing and communications signals. But is their richness a business risk? It may be if your customers are Comcast customers.
A Virtual Checklist
News  |  9/7/2007  | 
Enterprises need to get the message that benchmarking systems are key to security
ID Theft Research Group to Come Out of the Shadows
News  |  9/7/2007  | 
The Center for Identity Management and Information Protection is about to reveal new findings about ID thieves to US Secret Service, DOJ agency
Group Sues White House to Restore Missing Emails
News  |  9/7/2007  | 
National Security Archive says White House must reactivate its email archiving system
Shavlik Rolls Out Compliance Tool
News  |  9/7/2007  | 
Shavlik releases NetChk Compliance 3.0 with additional flexibility to simplify and automate organizations' efforts to enforce compliance
Citrix's Security Play
News  |  9/7/2007  | 
With acquisition of XenSource, Citrix puts itself at forefront of data center virtualization - and security
Quote of the Week: Hacks, Drugs & Rock 'n' Roll
Quick Hits  |  9/7/2007  | 
Researcher Tom Ptacek offers his view on how hackers get their stripes
Time to Guard Your Instant Messaging Traffic
Commentary  |  9/6/2007  | 
One downside with popular IT technologies is they attract unsavory elements. Akonix Systems Inc. , a vendor specializing in instant messaging security products, reported that the number of instant messaging specific viruses doubled from July to August. The change could mean a shift in hacker priorities, so therefore small and medium enterprises need to take a closer look at protecting their IM traffic.
Bloggers Held Under New Thailand Computer Crime Law
News  |  9/6/2007  | 
Online writers posted comments 'insulting to the monarchy'
Bloody Biometrics!
News  |  9/6/2007  | 
Forget your fingerprint or iris - now your veins can get you into the building
<<   <   Page 4 / 5   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-05
Newsletter Module v3.x was discovered to contain a SQL injection vulnerability via the zemez_newsletter_email parameter at /index.php.
PUBLISHED: 2022-07-05
An access control issue in Ingredient Stock Management System v1.0 allows attackers to take over user accounts via a crafted POST request to /isms/classes/Users.php.
PUBLISHED: 2022-07-05
Ingredient Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /isms/admin/stocks/view_stock.php.
PUBLISHED: 2022-07-05
An arbitrary file upload vulnerability in Dice v4.2.0 allows attackers to execute arbitrary code via a crafted file.
PUBLISHED: 2022-07-05
So Filter Shop v3.x was discovered to contain multiple blind SQL injection vulnerabilities via the att_value_id , manu_value_id , opt_value_id , and subcate_value_id parameters at /index.php?route=extension/module/so_filter_shop_by/filter_data.