Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in January 2015
IBM Research Announces Cloud Breakthrough For Protecting Personal Data
Products and Releases  |  1/28/2015  | 
Sophisticated cryptographic algorithm can prevent unwanted sharing of personal data, including credit card numbers
ZeroFOX Acquires Vulnr
Products and Releases  |  1/28/2015  | 
ZeroFOX accelerates growth through the acquisition of stealth-mode security company Vulnr
Proofpoint Releases Enterprise Protection Suite 8.0, Advances Email Security Leadership
Products and Releases  |  1/28/2015  | 
Enhancements include cloud-based email continuity, S/MIME encryption, SAML single sign-on and Sendmail MTA
Virtru Announces General Availability of its Encrypted Email and Digital Privacy Service
Products and Releases  |  1/28/2015  | 
Free End-to-End Email Encryption Available Forever; Advanced Control Features for Businesses Now Available in Virtru Pro
New Patent Eliminates Passwords
Products and Releases  |  1/28/2015  | 
Patented technology from TextPower verifies your identity while simplifying website logins; introduces SnapID that replaces usernames and passwords
Verizon Announces Security Enhancement for IoT Deployments
Products and Releases  |  1/28/2015  | 
Managed Certificate Services platform is designed to authenticate objects and machines and secure data transmitted between these connections
Ed Survey Results: Insider Threats
Products and Releases  |  1/28/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources
CYBERTECH SPONSORING DATA PRIVACY DAY 2015: SECURING THE INTERNET OF THINGS NATIONAL SEMINAR
Products and Releases  |  1/27/2015  | 
Invitation-only Event Will Take Think Tank Approach to Possible Solutions
15th Member of Washington, D.C.-Based Identity Theft Ring Pleads Guilty
Products and Releases  |  1/26/2015  | 
Defendant Admits To Targeting Parents Of Hospitalized Children, Among Others
Ad Networks Just Got More Secure
Products and Releases  |  1/26/2015  | 
New ad network puts users first, combines beautiful user experience with best in class privacy controls
SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity
Products and Releases  |  1/26/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources; SolarWinds Examines Policies, Processes and Threat Prevention Tools to Address Lack of Internal Visibility
New GHOST Vuln Affecting Linux
Products and Releases  |  1/26/2015  | 
High Severity Vulnerability Found in Linux GNU C Library Gives Attackers Control without System Credentials; Patches Available Today
Bitglass Breach Discovery Limits Damage From Data Breaches
Products and Releases  |  1/21/2015  | 
Automated Service Enables Enterprises to Discover Data Breaches Early
Adroit Digital Study Reveals Consumer Data Privacy and Security Concerns as President Obama Talks Cybersecurity in State of the Union
Products and Releases  |  1/21/2015  | 
70% believe the government isnt protecting their online privacy; a majority are most concerned about privacy and security on social media
Updated for 2015: Tools Designed to Manage Third Party Risk
Products and Releases  |  1/21/2015  | 
Shared Assessments Program Tools Empower Vendor Management Confidence
Vormetrics 2015 Insider Threat Report: 93% of U.S. Organizations Polled Vulnerable to Insider Threats
Products and Releases  |  1/21/2015  | 
Report Follows Record Year of Data Breaches; Reveals Spending Priorities, Security Risks
Online Trust Alliance Determines Over 90 Percent of Data Breaches in First Half of 2014 Could Have Been Easily Prevented
Products and Releases  |  1/21/2015  | 
Findings in newly released OTA Data Protection Best Practices and Risk Assessment Guides
ForgeRock and FireEye Join Forces to Detect Cyber Attacks with Identity-Aware Threat Intelligence Solution
Products and Releases  |  1/21/2015  | 
Integration of FireEye Threat Analytics Platform and the ForgeRock Identity Platform to Enable Organizations to Correlate Identity-Based Intrusions with Enterprise-wide Threat Indicators
RiskIQ Finds More Than 11 Percent of Android Banking and Finance- Related Apps are Suspicious
Products and Releases  |  1/21/2015  | 
Research of 350,000 Mobile Apps across 90 App Stores Reveals 40,000 Containing Malware or Suspicious Binaries
SQL Injection Vulnerabilities Surge
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Distil Networks Acquires ScrapeSentry to Add 24/7 Security Ops Center
Products and Releases  |  1/13/2015  | 
New Managed Security Service Evaluates and Responds to Bot Threats in Real-Time Based on Each Customers Unique Security Policy and Response Plan
Websense Transformation Delivers New TRITON APX 8.0 Platform
Products and Releases  |  1/13/2015  | 
Websense Addresses Skills Gap with TRITON APX 8.0, the Result of 18 Months of Business Transformation & Innovation.
EyeLock's myris Is First and Only Iris Authenticator for New FIDO Open Industry Standard
Products and Releases  |  1/5/2015  | 
FIDO Ready(TM) certified device for universal strong authentication, myris provides consumers and enterprises with unprecedented security
Silent Circle Appoints Bill Conner CEO
Products and Releases  |  1/5/2015  | 
Former Entrust CEO, Nortel President Also Joins Board of Directors of Silent Circle, Blackphone


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...