Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in January 2014
Page 1 / 2   >   >>
Russian National Sentenced To 30 Months In Prison For $1 Million Trading Account Hack, Securities Fraud Scheme
Products and Releases  |  1/31/2014  | 
Petr Murmylyuk admitted that he participated in a conspiracy to steal from online trading accounts at Scottrade, E*Trade, Fidelity, Schwab, and others
DOD Announces Nomination Of Cyber Command Commander/NSA Director
Products and Releases  |  1/31/2014  | 
Navy Vice Adm. Michael S. Rogers currently serves the U.S. Fleet Cyber Command commander
New FireEye Release Adds More Layers Of Security, Management
Products and Releases  |  1/31/2014  | 
FireEye OS 7.1 simplifies virtual machine-based security management as well as extends VM analysis to IPv6 traffic
Defense.Net Launches Frontline: A Primary DDoS Mitigation Service With 10x The Capacity Of Legacy Services
Products and Releases  |  1/31/2014  | 
DDoS Frontline protects against the entire spectrum of DDoS attacks
CloudLock Raises $16.5 Million Series C Round
Products and Releases  |  1/30/2014  | 
Funding round from new investor Bessemer Venture Partners, and participation of existing investors Cedar Fund and Ascent Venture Partners
Zimperium Launches Mobile Security Solution Powered By Artificial Intelligence
Products and Releases  |  1/30/2014  | 
Company launches two new products that monitor behavior patterns on mobile devices to detect and contain advanced cyberattacks
CYREN Launches Cloud-Based Web Security Service
Products and Releases  |  1/30/2014  | 
CYREN WebSecurity leverages the company's GlobalView Cloud infrastructure
HALOCK Investigation Finds That Over 70% Of Mortgage Lenders May Be Putting Sensitive Financial Data At Risk
Products and Releases  |  1/30/2014  | 
Lenders permitted applicants to send personal and financial information over unencrypted email as email attachments
The FIDO Alliance Welcomes RSA To Board Of Directors
Products and Releases  |  1/30/2014  | 
FIDO Alliance members share technology and collaborate to deliver open specs for universal strong authentication
Symantec Reports Third Quarter Fiscal 2014 Results
Products and Releases  |  1/29/2014  | 
Reports revenue of $1.7 billion for its third quarter of fiscal year 2014, ended Dec. 27, 2013
Check Point Researchers Find Critical Vulnerability On Wikipedia, Other ‘Wiki’ Sites
Products and Releases  |  1/29/2014  | 
Vulnerability left MediaWiki, which includes Wikipedia.org, exposed to remote code execution
Verizon Collaborating With PRIVO To Protect Children's Online Activities And Information
Products and Releases  |  1/29/2014  | 
Under pilot program, PRIVO will establish the Minors Trust Framework to provide parents more control and help businesses address COPPA requirements
Bitglass Unveils Cloud and Mobile Security Solution That Respects Employee Privacy
Products and Releases  |  1/29/2014  | 
SaaS security solution secures corporate data on mobile devices and in cloud apps
NT OBJECTives Releases NTOSpider Selenium Integration
Products and Releases  |  1/29/2014  | 
NTOSpider's integration with Selenium can also be used to automate complex authentication solutions
BeyondInsight Provides Collaborative Approach To IT Risk Management
Products and Releases  |  1/29/2014  | 
BeyondInsight provides a common dashboard interface for multiple BeyondTrust solutions
MACH37 Cybersecurity Accelerator Increases Initial Investment To $50K Per Company
Products and Releases  |  1/28/2014  | 
MACH37 created to accelerate the development of the next generation of information security product companies
ScrapeDefender Launches Cloud-Based Anti-Scraping Solution To Protect Web Sites From Content Theft
Products and Releases  |  1/28/2014  | 
Monitoring system uses intrusion detection-based algorithms and patented technology to analyze network activity
CallingID Launches Facebook, LinkedIn And Twitter Privacy Protection Tool
Products and Releases  |  1/28/2014  | 
MyFacePrivacy analyzes a users' social-network privacy settings, and helps them choose and implement a tailored privacy policy
Nicholas Percoco, Prominent Cyber Security Professional, Joins KPMG Information Protection Group
Products and Releases  |  1/28/2014  | 
Percoco is known for his cybersecurity research on mobile devices and data breach statistics
Electronic Transactions Association (ETA) Updates Congress On Payments Industry Security
Products and Releases  |  1/27/2014  | 
Letter reiterated the payments industry's support for a uniform, national standard for data breach notification
SecureState Releases Black POS Malware Scanning Tool
Products and Releases  |  1/27/2014  | 
Black POS is the reported culprit behind recent retail data breaches
Cyber-Defense Specialist Gets Backing Of Major Smartphone Manufacturer And Launches New Approach To Mobile Security Threats
Products and Releases  |  1/23/2014  | 
Zimperium launches two products to protect organizations from advanced persistent threats on mobile
Financial Data Leads The Malicious Spam Hit List For Third Year In A row
Products and Releases  |  1/23/2014  | 
In some spam categories commercial advertising is being gradually displaced by criminal mailings
Socially Engineered Behavior To Blame For Most Security Breaches
Products and Releases  |  1/23/2014  | 
KnowBe4 analysis shows effectiveness of security awareness training on employees
HID Global Acquires IdenTrust To Expand Its Leadership Position In Secure Identity Solutions
Products and Releases  |  1/22/2014  | 
IdenTrust is the largest supplier of digital identities for the DoD’s External Certification Authority program and the GSA's Access Certificates for Electronic Services (ACES) program
ThreatMetrix Shares Strategies For Implementing Effective Security Measures Without Disrupting Authentic Users And Compromising Privacy
Products and Releases  |  1/22/2014  | 
Company suggests using behavior-based identity proofing
Online Trust Alliance Finds Data Breaches Spiked To Record Level In 2013
Products and Releases  |  1/22/2014  | 
Yet 89 percent of all breach incidents were avoidable had basic security controls and best practices been enforced
National Retail Foundation Urges Transition To More Secure And Advanced Credit And Debit Cards
Products and Releases  |  1/22/2014  | 
Expresses support for immediate transition from magnetic-stripe cards to more secure and advanced PIN and chip cards
Bluebox Security Closes $18 Million Series B Funding
Products and Releases  |  1/21/2014  | 
Capital will be used to scale sales and marketing
'Password' Unseated By '123456' On Splashdata's Annual 'Worst Passwords' List
Products and Releases  |  1/21/2014  | 
List shows that many people continue to put themselves at risk by using weak, easily guessable passwords
New Encrypted Email And Privacy Service for Consumers: Recall Messages, Restrict Forwarding, Set Expiration
Products and Releases  |  1/21/2014  | 
Virtru secures private communications for popular email services and clients, including Gmail, Yahoo, Outlook, and Mac Mail
Qualys Announces Partnership With Lumension
Products and Releases  |  1/21/2014  | 
Companies to offer joint customers a complete vulnerability assessment and patch management solution
iSEC Partners, EFF, And DEF CON Announce TrustyCon For Feb. 27
Products and Releases  |  1/21/2014  | 
Conference gives a voice to speakers who dropped out of RSA
Israeli Cybersecurity Start-Up Aorato Emerges From Stealth Mode
Products and Releases  |  1/21/2014  | 
Aorato's approach is to focus on Microsoft's Active Directory services activities by observing network traffic between AD servers and active network entities
Lancope And Ponemon Institute Study: CEOs In The Dark About Cyberattacks
Products and Releases  |  1/21/2014  | 
Results also indicate that many organizations are ill-prepared to fend off today’s advanced threats
Adblock Plus Available For Safari
Products and Releases  |  1/21/2014  | 
The Adblock Plus add-on is now available for every major browser
Saviynt Releases SAP HANA Security Solution
Products and Releases  |  1/16/2014  | 
Integrates natively with SAP HANA and provides a business layer for both security and business teams
New Head For Panda Security
Products and Releases  |  1/16/2014  | 
Diego Navarrete joins Panda Security from IBM
Palo Alto Networks Unveils Evolution To Threat Prevention Strategy, Significant WildFire Enhancements
Products and Releases  |  1/15/2014  | 
Advancements include extended file visibility and zero-day exploit detection
Wickr Announces Bug Bounty Program--100 Million Messages Sent
Products and Releases  |  1/15/2014  | 
Will pay hackers up to $100,000 to uncover any vulnerabilities that substantially affect the confidentiality or integrity of its users' data
ForeScout Names Enrique Salem, Former Symantec CEO, To Board Of Directors
Products and Releases  |  1/14/2014  | 
Salem brings more than 25 years of executive leadership and business strategy experience to ForeScout
Black Lotus Delivers DDoS Protection For Data Centers And Service Providers
Products and Releases  |  1/14/2014  | 
Protection for Networks solution is providing data center companies and service providers worldwide with around-the-clock availability
Mobile Applications Being Used for DDoS Attacks According To Prolexic's Latest Quarterly Report
Products and Releases  |  1/14/2014  | 
Report shows total number of attacks against clients in Q4 2013 once again set a new record for one quarter
ISC(2) Foundation to Offer $145,000 For 2014 Information Security Scholarships
Products and Releases  |  1/14/2014  | 
Foundation evaluates applicants based on academic excellence, passion for the industry, and financial need
Employees Revealed As Greatest Challenge To IT Security, Says SecureData
Products and Releases  |  1/13/2014  | 
While 40 percent of respondents viewed operations teams as the greatest risk to security, finance teams were also seen as a significant worry
Hotspot Shield VPN Reaches 200 MM Downloads + Security Trends
Products and Releases  |  1/13/2014  | 
App now protects and keeps private more than 350,000 social messages and 50,000 emails every hour
Datacard Group Finalizes Acquisition Of Entrust
Products and Releases  |  1/13/2014  | 
Companies intend to help further unify identification-security technologies
Healthcare Organizations Plan First Industrywide Cyber Attack Exercise, "CyberRX"
Products and Releases  |  1/13/2014  | 
Exercises will examine scenarios targeting information systems, medical devices, and other essential technology resources
New Roads Ahead For Android And The Open Automotive Alliance
Products and Releases  |  1/9/2014  | 
Tech companies and auto industry leaders join forces to make the connected car a reality in 2014
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file