Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Perimeter posted in June 2006
Data Losses Hit Four More
News  |  6/22/2006  | 
The list of big-name organizations reporting security breaches just keeps growing
No Easy Fix for Branch Office Blues
News  |  6/22/2006  | 
Branch offices spell IT trouble, says Arun Taneja, and need an 'arsenal' to fix things
Sorry, No Naked World Cup
News  |  6/21/2006  | 
A new worm promises to show users photos of a nude soccer match, but it's a disappointing email address, sucker
The Blue Flu?
News  |  6/21/2006  | 
It could be contagious for mobile devices, finds new survey of Bluetooth security
Retailers Lag on Security Standard
News  |  6/20/2006  | 
Nearly one full year after credit card providers mandated compliance with the Payment Card Industry Data Security Standard, most major retailers still aren't making the grade
NeoScale Claims Speedy Encryption
News  |  6/20/2006  | 
To roll out tape encryption software with new performance features tomorrow
Social Engineering Gets Smarter
News  |  6/16/2006  | 
Good old-fashioned schmooze still the best way to get information and access, particularly if the target works in IT
IPLocks Locks Up $11M
News  |  6/15/2006  | 
Database security startup looks to spread its software message
Mobile VPN Rivals Merge
News  |  6/14/2006  | 
Court dates made playmates out of NetMotion and Padcom
Restricting All but the Predators
News  |  6/14/2006  | 
Child-porn filters proposed in UK law don't extend to email, IM, P2P, or encrypted links, which some say undermines the whole effort
New Terrorist Profile: Phone Users
News  |  6/13/2006  | 
For better or worse, VOIP may have just gotten its biggest shot in the arm ever
Two Charged in VOIP Hacking Scandal
News  |  6/8/2006  | 
Authorities say two men ran a wholesale VOIP business using allegedly fake codes to load call traffic onto unsuspecting VOIP networks
EMC Nets nLayers, Scopes Security
News  |  6/7/2006  | 
Launches Analyst Day with acquisition announcement and word of more to come
Social Engineering, the USB Way
News  |  6/7/2006  | 
Those thumb drives can turn external threats into internal ones in two easy steps
At MedAvant, Security Helps Pay the Bills
News  |  6/7/2006  | 
Healthcare billing and payment processing company implements PortAuthority software to stop unauthorized traffic
Wireless Requires Flexibility, Security
News  |  6/6/2006  | 
Commercial mortgage exec warns not to overlook users' needs
File Security Gets All Cryptic
News  |  6/5/2006  | 
Vendors target file-level encryption and key management in an attempt to lock down users' data
Lancope Digs Into User Behavior
News  |  6/5/2006  | 
New user identity tracking capabilities will open up new security troubleshooting opportunities, vendor says
End of the Road for Kasten Chase
News  |  6/1/2006  | 
Encryption specialist, beset by financial problems, discontinues operations
Records Firm Not Risking Tape
News  |  6/1/2006  | 
Private firm picks NeoScale to encrypt sensitive data


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4966
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the...
CVE-2020-4968
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192427.
CVE-2020-4969
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniq...
CVE-2020-26285
PUBLISHED: 2021-01-21
OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.5, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to import/export data and to create widget instances was able to inject an exe...
CVE-2020-26295
PUBLISHED: 2021-01-21
OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.5, an administrator with permission to import/export data and to edit cms pages was able to inject an executable file on the server via layout xml. The latest OpenMage Versions up from 19.4.9 and ...