Products and Releases

Content posted in January 2014
Page 1 / 2   >   >>
Russian National Sentenced To 30 Months In Prison For $1 Million Trading Account Hack, Securities Fraud Scheme
Products and Releases  |  1/31/2014  | 
Petr Murmylyuk admitted that he participated in a conspiracy to steal from online trading accounts at Scottrade, E*Trade, Fidelity, Schwab, and others
DOD Announces Nomination Of Cyber Command Commander/NSA Director
Products and Releases  |  1/31/2014  | 
Navy Vice Adm. Michael S. Rogers currently serves the U.S. Fleet Cyber Command commander
New FireEye Release Adds More Layers Of Security, Management
Products and Releases  |  1/31/2014  | 
FireEye OS 7.1 simplifies virtual machine-based security management as well as extends VM analysis to IPv6 traffic
Defense.Net Launches Frontline: A Primary DDoS Mitigation Service With 10x The Capacity Of Legacy Services
Products and Releases  |  1/31/2014  | 
DDoS Frontline protects against the entire spectrum of DDoS attacks
CloudLock Raises $16.5 Million Series C Round
Products and Releases  |  1/30/2014  | 
Funding round from new investor Bessemer Venture Partners, and participation of existing investors Cedar Fund and Ascent Venture Partners
Zimperium Launches Mobile Security Solution Powered By Artificial Intelligence
Products and Releases  |  1/30/2014  | 
Company launches two new products that monitor behavior patterns on mobile devices to detect and contain advanced cyberattacks
CYREN Launches Cloud-Based Web Security Service
Products and Releases  |  1/30/2014  | 
CYREN WebSecurity leverages the company's GlobalView Cloud infrastructure
HALOCK Investigation Finds That Over 70% Of Mortgage Lenders May Be Putting Sensitive Financial Data At Risk
Products and Releases  |  1/30/2014  | 
Lenders permitted applicants to send personal and financial information over unencrypted email as email attachments
The FIDO Alliance Welcomes RSA To Board Of Directors
Products and Releases  |  1/30/2014  | 
FIDO Alliance members share technology and collaborate to deliver open specs for universal strong authentication
Symantec Reports Third Quarter Fiscal 2014 Results
Products and Releases  |  1/29/2014  | 
Reports revenue of $1.7 billion for its third quarter of fiscal year 2014, ended Dec. 27, 2013
Check Point Researchers Find Critical Vulnerability On Wikipedia, Other ‘Wiki’ Sites
Products and Releases  |  1/29/2014  | 
Vulnerability left MediaWiki, which includes Wikipedia.org, exposed to remote code execution
Verizon Collaborating With PRIVO To Protect Children's Online Activities And Information
Products and Releases  |  1/29/2014  | 
Under pilot program, PRIVO will establish the Minors Trust Framework to provide parents more control and help businesses address COPPA requirements
Bitglass Unveils Cloud and Mobile Security Solution That Respects Employee Privacy
Products and Releases  |  1/29/2014  | 
SaaS security solution secures corporate data on mobile devices and in cloud apps
NT OBJECTives Releases NTOSpider Selenium Integration
Products and Releases  |  1/29/2014  | 
NTOSpider's integration with Selenium can also be used to automate complex authentication solutions
BeyondInsight Provides Collaborative Approach To IT Risk Management
Products and Releases  |  1/29/2014  | 
BeyondInsight provides a common dashboard interface for multiple BeyondTrust solutions
MACH37 Cybersecurity Accelerator Increases Initial Investment To $50K Per Company
Products and Releases  |  1/28/2014  | 
MACH37 created to accelerate the development of the next generation of information security product companies
ScrapeDefender Launches Cloud-Based Anti-Scraping Solution To Protect Web Sites From Content Theft
Products and Releases  |  1/28/2014  | 
Monitoring system uses intrusion detection-based algorithms and patented technology to analyze network activity
CallingID Launches Facebook, LinkedIn And Twitter Privacy Protection Tool
Products and Releases  |  1/28/2014  | 
MyFacePrivacy analyzes a users' social-network privacy settings, and helps them choose and implement a tailored privacy policy
Nicholas Percoco, Prominent Cyber Security Professional, Joins KPMG Information Protection Group
Products and Releases  |  1/28/2014  | 
Percoco is known for his cybersecurity research on mobile devices and data breach statistics
Electronic Transactions Association (ETA) Updates Congress On Payments Industry Security
Products and Releases  |  1/27/2014  | 
Letter reiterated the payments industry's support for a uniform, national standard for data breach notification
SecureState Releases Black POS Malware Scanning Tool
Products and Releases  |  1/27/2014  | 
Black POS is the reported culprit behind recent retail data breaches
Cyber-Defense Specialist Gets Backing Of Major Smartphone Manufacturer And Launches New Approach To Mobile Security Threats
Products and Releases  |  1/23/2014  | 
Zimperium launches two products to protect organizations from advanced persistent threats on mobile
Financial Data Leads The Malicious Spam Hit List For Third Year In A row
Products and Releases  |  1/23/2014  | 
In some spam categories commercial advertising is being gradually displaced by criminal mailings
Socially Engineered Behavior To Blame For Most Security Breaches
Products and Releases  |  1/23/2014  | 
KnowBe4 analysis shows effectiveness of security awareness training on employees
HID Global Acquires IdenTrust To Expand Its Leadership Position In Secure Identity Solutions
Products and Releases  |  1/22/2014  | 
IdenTrust is the largest supplier of digital identities for the DoD’s External Certification Authority program and the GSA's Access Certificates for Electronic Services (ACES) program
ThreatMetrix Shares Strategies For Implementing Effective Security Measures Without Disrupting Authentic Users And Compromising Privacy
Products and Releases  |  1/22/2014  | 
Company suggests using behavior-based identity proofing
Online Trust Alliance Finds Data Breaches Spiked To Record Level In 2013
Products and Releases  |  1/22/2014  | 
Yet 89 percent of all breach incidents were avoidable had basic security controls and best practices been enforced
National Retail Foundation Urges Transition To More Secure And Advanced Credit And Debit Cards
Products and Releases  |  1/22/2014  | 
Expresses support for immediate transition from magnetic-stripe cards to more secure and advanced PIN and chip cards
Bluebox Security Closes $18 Million Series B Funding
Products and Releases  |  1/21/2014  | 
Capital will be used to scale sales and marketing
'Password' Unseated By '123456' On Splashdata's Annual 'Worst Passwords' List
Products and Releases  |  1/21/2014  | 
List shows that many people continue to put themselves at risk by using weak, easily guessable passwords
New Encrypted Email And Privacy Service for Consumers: Recall Messages, Restrict Forwarding, Set Expiration
Products and Releases  |  1/21/2014  | 
Virtru secures private communications for popular email services and clients, including Gmail, Yahoo, Outlook, and Mac Mail
Qualys Announces Partnership With Lumension
Products and Releases  |  1/21/2014  | 
Companies to offer joint customers a complete vulnerability assessment and patch management solution
iSEC Partners, EFF, And DEF CON Announce TrustyCon For Feb. 27
Products and Releases  |  1/21/2014  | 
Conference gives a voice to speakers who dropped out of RSA
Israeli Cybersecurity Start-Up Aorato Emerges From Stealth Mode
Products and Releases  |  1/21/2014  | 
Aorato's approach is to focus on Microsoft's Active Directory services activities by observing network traffic between AD servers and active network entities
Lancope And Ponemon Institute Study: CEOs In The Dark About Cyberattacks
Products and Releases  |  1/21/2014  | 
Results also indicate that many organizations are ill-prepared to fend off today’s advanced threats
Adblock Plus Available For Safari
Products and Releases  |  1/21/2014  | 
The Adblock Plus add-on is now available for every major browser
Saviynt Releases SAP HANA Security Solution
Products and Releases  |  1/16/2014  | 
Integrates natively with SAP HANA and provides a business layer for both security and business teams
New Head For Panda Security
Products and Releases  |  1/16/2014  | 
Diego Navarrete joins Panda Security from IBM
Palo Alto Networks Unveils Evolution To Threat Prevention Strategy, Significant WildFire Enhancements
Products and Releases  |  1/15/2014  | 
Advancements include extended file visibility and zero-day exploit detection
Wickr Announces Bug Bounty Program--100 Million Messages Sent
Products and Releases  |  1/15/2014  | 
Will pay hackers up to $100,000 to uncover any vulnerabilities that substantially affect the confidentiality or integrity of its users' data
ForeScout Names Enrique Salem, Former Symantec CEO, To Board Of Directors
Products and Releases  |  1/14/2014  | 
Salem brings more than 25 years of executive leadership and business strategy experience to ForeScout
Black Lotus Delivers DDoS Protection For Data Centers And Service Providers
Products and Releases  |  1/14/2014  | 
Protection for Networks solution is providing data center companies and service providers worldwide with around-the-clock availability
Mobile Applications Being Used for DDoS Attacks According To Prolexic's Latest Quarterly Report
Products and Releases  |  1/14/2014  | 
Report shows total number of attacks against clients in Q4 2013 once again set a new record for one quarter
ISC(2) Foundation to Offer $145,000 For 2014 Information Security Scholarships
Products and Releases  |  1/14/2014  | 
Foundation evaluates applicants based on academic excellence, passion for the industry, and financial need
Employees Revealed As Greatest Challenge To IT Security, Says SecureData
Products and Releases  |  1/13/2014  | 
While 40 percent of respondents viewed operations teams as the greatest risk to security, finance teams were also seen as a significant worry
Hotspot Shield VPN Reaches 200 MM Downloads + Security Trends
Products and Releases  |  1/13/2014  | 
App now protects and keeps private more than 350,000 social messages and 50,000 emails every hour
Datacard Group Finalizes Acquisition Of Entrust
Products and Releases  |  1/13/2014  | 
Companies intend to help further unify identification-security technologies
Healthcare Organizations Plan First Industrywide Cyber Attack Exercise, "CyberRX"
Products and Releases  |  1/13/2014  | 
Exercises will examine scenarios targeting information systems, medical devices, and other essential technology resources
New Roads Ahead For Android And The Open Automotive Alliance
Products and Releases  |  1/9/2014  | 
Tech companies and auto industry leaders join forces to make the connected car a reality in 2014
Page 1 / 2   >   >>


New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10000
PUBLISHED: 2018-05-24
In MuPDF 1.12.0 and earlier, multiple use of uninitialized value bugs in the PDF parser could allow an attacker to cause a denial of service (crash) or influence program flow via a crafted file.
CVE-2018-10001
PUBLISHED: 2018-05-24
OpenFlow version 1.0 onwards contains a Denial of Service and Improper authorization vulnerability in OpenFlow handshake: The DPID (DataPath IDentifier) in the features_reply message are inherently trusted by the controller. that can result in Denial of Service, Unauthorized Access, Network Instabil...
CVE-2018-10001
PUBLISHED: 2018-05-24
The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed ...
CVE-2018-10003
PUBLISHED: 2018-05-24
curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerab...
CVE-2018-10003
PUBLISHED: 2018-05-24
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been...