Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in September 2007
<<   <   Page 4 / 5   >   >>
Company Computers Not Safe At Home
Commentary  |  9/12/2007  | 
A warning from Computer Associates that home computers are increasingly vulnerable and threatened -- surprise! -- set me to wondering how many of those computers aren't really home computers at all, but business computers used at home... and, more critically, used at home by people other than the authorized employee.
Insider Threats Increase, But Damage Is Minimal
News  |  9/12/2007  | 
Annual Computer Security Institute study says employees are the source of most incidents - but not the biggest cost
New Security Awareness Site Gives End Users the Picture
News  |  9/12/2007  | 
Novel new security education site uses cartoons to help users understand phishing, pharming, and malware
Maybe We're Not Ready for Some Football
News  |  9/12/2007  | 
The latest Storm worm come-on targets fantasy football fanatics. How should enterprises respond?
PGP Adds Secure Delivery Options
News  |  9/12/2007  | 
PGP Corporation enables broad range of solutions for secure communications
Klocwork Doubles Customer Base
News  |  9/12/2007  | 
Company doubles customer base, increases new customer revenue by more than 150%
BigFix to Enhance Platform
News  |  9/12/2007  | 
Forthcoming release 7.0 to support significant business continuity functions
Survey: Remote Worker Security Concerns
News  |  9/12/2007  | 
SonicWALL: Managers believe in motivational benefits of remote working but worry about productivity, team bonding and data security
Latest Disease in Hospitals: Identity Loss
Quick Hits  |  9/12/2007  | 
When it comes to laptop theft, medical institutions are getting a rash
Untangle Virtualizes Its Gateway
News  |  9/12/2007  | 
Dedicated machine no longer required to run free alternative to SonicWALL
Vortel Announces 3rd SOA Security Conference
News  |  9/12/2007  | 
Vordel 3rd Annual SOA Security Conference focuses on practical control of SOA
BT Counterpane Launches Service
News  |  9/12/2007  | 
BT Counterpane launches enhanced managed vulnerability scan services
Trend Micro Licenses Third Brigade's Host IDS
News  |  9/12/2007  | 
Trend Micro licenses host intrusion defense technology from third brigade
Do Not Ask Your Customers for Their Social Security Numbers
Commentary  |  9/11/2007  | 
Do you want to make potential and existing customers feel secure? If so, one item that you need to avoid is asking them for their social security numbers. A poll by Consumer Reports National Research found that close to nine of every ten Americans want state and federal lawmakers to pass laws restricting the use of Social Security numbers. So if you want consumers coming back and ordering products
Skype Worm Bubbles Up
Commentary  |  9/11/2007  | 
The latest worm wriggling from Skype (for Windows) user to Skype user by way of the network's chat function gives a good opportunity to remind employees not to click on unexpected messages or images on free VoIPware any more than they should anywhere else.
Annual CSI Study: Cost of Cybercrime Is Skyrocketing
News  |  9/11/2007  | 
Average annual loss per company has more than doubled since last year, according to bellwether study
Network Engines Adds Virtual Appliance Service
News  |  9/11/2007  | 
Network Engines announced the availability of its new Virtual Appliance Solution service
'Virtual' Vulnerabilities About to Become Reality
News  |  9/11/2007  | 
Virtualization bugs may be rare, but they are only the tip of the iceberg
Tor's Privacy Problems
News  |  9/11/2007  | 
Technology developed to protect privacy may actually threaten it
Xirrus Deploys High Density WiFi for ITU
News  |  9/11/2007  | 
Xirrus selected by international telecommunication union for high density WiFi deployment in Geneva
Cyberoam Boosts UTM Solutions
News  |  9/11/2007  | 
Cyberoam announces feature enhancements to strengthen enterprise security
Bioscrypt Launches FIPS-201 Biometric Reader
News  |  9/11/2007  | 
Bioscrypt introduces Biometric Reader to address the evolving needs of the US federal market
BeCrypt Demos Compliance With Juniper
News  |  9/11/2007  | 
BeCrypt to demonstrate 'Secure Access, Trusted Client' capability with Juniper Networks at InfoSec New York
Full-Disk Encryption Grows
News  |  9/11/2007  | 
Group reports the number of organizations protecting sensitive data with encryption is rapidly expanding
Storm Trojan: As Overexposed as Britney
Quick Hits  |  9/11/2007  | 
If your head is about to explode from so many Storm worm sightings, here's a little relief
Botnet Storm Surge: Insecurity In Numbers
Commentary  |  9/10/2007  | 
Whatever the summer heavy weather season has been like in your neck of the woods, the cyber-season saw the explosive growth of a monster security storm. After building strength all year, the Storm botnet worm has created a zombie grid so large that it could be a threat to... pretty much whatever the hackers who created it want it to be a threat to.
Hacking the White House
News  |  9/10/2007  | 
War walk around the President's house exposes some interesting vulnerabilities outside the fence, but solid defenses inside
Why Honeypots Are Sweet
News  |  9/10/2007  | 
Honeypots may not be practical for the enterprise, but you can still learn a lot from them
AirMagnet Announces Survey/Planner 5.0
News  |  9/10/2007  | 
New versions of AirMagnet Survey and AirMagnet Planner automate wireless LAN design and optimization
Privaris, Alacera Partner
News  |  9/10/2007  | 
Alacera to leverage Privaris plusID Personal, wireless biometric technology to provide heightened security for its ID verification module
Breaking Down the Wall
News  |  9/10/2007  | 
US government officials are in a dither about Lenovo's potential acquisition of Seagate. But are any encryption secrets really at risk?
New Tool Helps Secure Kids Online
News  |  9/10/2007  | 
Global Security One advises parents to ensure that they have appropriate systems to protect their children
StillSecure, EDS Partner for Marines
News  |  9/10/2007  | 
StillSecure and EDS announce subcontractor relationship to deliver enterprise-wide solutions to Navy Marine Corps Intranet
A Battery That Runs on What?
Quick Hits  |  9/10/2007  | 
See how Japanese researchers are powering your favorite gadget with your favorite, um, bodily fluid
PatchLink Unveils New Name
News  |  9/10/2007  | 
PatchLink unveils new corporate name: Lumension Security
New Advanced Terrorism Risk Analytics Tool
News  |  9/10/2007  | 
Pitney Bowes MapInfo aligns with exclusive analysis to provide advanced terrorism risk analytics
Sentillion Rolls Out SSO for Healthcare
News  |  9/10/2007  | 
Only healthcare-specific, enterprise-class SSO solution that is low cost, full-featured, and reduces deployment time from months to days
Reading Hospital Chooses SSO
News  |  9/10/2007  | 
The Reading Hospital selects Encentuate for identity and access management
Startup Led by Ex-DHS Cyberchief Rolls Out Forensics Tool
News  |  9/10/2007  | 
NetWitness NextGen analyzes attacks, risks, and verifies compliance
PatchLink Retrenches for IPO With New Name, Products
News  |  9/10/2007  | 
Lumension Security to go head-to-head with CA, McAfee
Bandwidth Is A Business Security Matter, Too
Commentary  |  9/7/2007  | 
The more we can get, the more want to get -- nowhere truer than on the Internet, and getting truer by the day as rich video, audio, effects and extras become an expected part of the traffic. Not just entertainment traffic -- more and more small to midsized businesses are taking advantage of rich media and Web 2.0-ish techniques to send sophisticated sales, marketing and communications signals. But is their richness a business risk? It may be if your customers are Comcast customers.
A Virtual Checklist
News  |  9/7/2007  | 
Enterprises need to get the message that benchmarking systems are key to security
ID Theft Research Group to Come Out of the Shadows
News  |  9/7/2007  | 
The Center for Identity Management and Information Protection is about to reveal new findings about ID thieves to US Secret Service, DOJ agency
Group Sues White House to Restore Missing Emails
News  |  9/7/2007  | 
National Security Archive says White House must reactivate its email archiving system
Shavlik Rolls Out Compliance Tool
News  |  9/7/2007  | 
Shavlik releases NetChk Compliance 3.0 with additional flexibility to simplify and automate organizations' efforts to enforce compliance
Citrix's Security Play
News  |  9/7/2007  | 
With acquisition of XenSource, Citrix puts itself at forefront of data center virtualization - and security
Quote of the Week: Hacks, Drugs & Rock 'n' Roll
Quick Hits  |  9/7/2007  | 
Researcher Tom Ptacek offers his view on how hackers get their stripes
Time to Guard Your Instant Messaging Traffic
Commentary  |  9/6/2007  | 
One downside with popular IT technologies is they attract unsavory elements. Akonix Systems Inc. , a vendor specializing in instant messaging security products, reported that the number of instant messaging specific viruses doubled from July to August. The change could mean a shift in hacker priorities, so therefore small and medium enterprises need to take a closer look at protecting their IM traffic.
Bloggers Held Under New Thailand Computer Crime Law
News  |  9/6/2007  | 
Online writers posted comments 'insulting to the monarchy'
Bloody Biometrics!
News  |  9/6/2007  | 
Forget your fingerprint or iris - now your veins can get you into the building
<<   <   Page 4 / 5   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-10-25
NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostProcessCallback().
PUBLISHED: 2021-10-25
NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostParseDeviceConfigurationDescriptor().
PUBLISHED: 2021-10-25
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.t...
PUBLISHED: 2021-10-25
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is locat...
PUBLISHED: 2021-10-25
Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. Ther...