Products and Releases

Content posted in January 2015
IBM Research Announces Cloud Breakthrough For Protecting Personal Data
Products and Releases  |  1/28/2015  | 
Sophisticated cryptographic algorithm can prevent unwanted sharing of personal data, including credit card numbers
ZeroFOX Acquires Vulnr
Products and Releases  |  1/28/2015  | 
ZeroFOX accelerates growth through the acquisition of stealth-mode security company Vulnr
Proofpoint Releases Enterprise Protection Suite 8.0, Advances Email Security Leadership
Products and Releases  |  1/28/2015  | 
Enhancements include cloud-based email continuity, S/MIME encryption, SAML single sign-on and Sendmail MTA
Virtru Announces General Availability of its Encrypted Email and Digital Privacy Service
Products and Releases  |  1/28/2015  | 
Free End-to-End Email Encryption Available Forever; Advanced Control Features for Businesses Now Available in Virtru Pro
New Patent Eliminates Passwords
Products and Releases  |  1/28/2015  | 
Patented technology from TextPower verifies your identity while simplifying website logins; introduces SnapID that replaces usernames and passwords
Verizon Announces Security Enhancement for IoT Deployments
Products and Releases  |  1/28/2015  | 
Managed Certificate Services platform is designed to authenticate objects and machines and secure data transmitted between these connections
Ed Survey Results: Insider Threats
Products and Releases  |  1/28/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources
CYBERTECH SPONSORING DATA PRIVACY DAY 2015: SECURING THE INTERNET OF THINGS NATIONAL SEMINAR
Products and Releases  |  1/27/2015  | 
Invitation-only Event Will Take Think Tank Approach to Possible Solutions
15th Member of Washington, D.C.-Based Identity Theft Ring Pleads Guilty
Products and Releases  |  1/26/2015  | 
Defendant Admits To Targeting Parents Of Hospitalized Children, Among Others
Ad Networks Just Got More Secure
Products and Releases  |  1/26/2015  | 
New ad network puts users first, combines beautiful user experience with best in class privacy controls
SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity
Products and Releases  |  1/26/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources; SolarWinds Examines Policies, Processes and Threat Prevention Tools to Address Lack of Internal Visibility
New GHOST Vuln Affecting Linux
Products and Releases  |  1/26/2015  | 
High Severity Vulnerability Found in Linux GNU C Library Gives Attackers Control without System Credentials; Patches Available Today
Bitglass Breach Discovery Limits Damage From Data Breaches
Products and Releases  |  1/21/2015  | 
Automated Service Enables Enterprises to Discover Data Breaches Early
Adroit Digital Study Reveals Consumer Data Privacy and Security Concerns as President Obama Talks Cybersecurity in State of the Union
Products and Releases  |  1/21/2015  | 
70% believe the government isnt protecting their online privacy; a majority are most concerned about privacy and security on social media
Updated for 2015: Tools Designed to Manage Third Party Risk
Products and Releases  |  1/21/2015  | 
Shared Assessments Program Tools Empower Vendor Management Confidence
Vormetrics 2015 Insider Threat Report: 93% of U.S. Organizations Polled Vulnerable to Insider Threats
Products and Releases  |  1/21/2015  | 
Report Follows Record Year of Data Breaches; Reveals Spending Priorities, Security Risks
Online Trust Alliance Determines Over 90 Percent of Data Breaches in First Half of 2014 Could Have Been Easily Prevented
Products and Releases  |  1/21/2015  | 
Findings in newly released OTA Data Protection Best Practices and Risk Assessment Guides
ForgeRock and FireEye Join Forces to Detect Cyber Attacks with Identity-Aware Threat Intelligence Solution
Products and Releases  |  1/21/2015  | 
Integration of FireEye Threat Analytics Platform and the ForgeRock Identity Platform to Enable Organizations to Correlate Identity-Based Intrusions with Enterprise-wide Threat Indicators
RiskIQ Finds More Than 11 Percent of Android Banking and Finance- Related Apps are Suspicious
Products and Releases  |  1/21/2015  | 
Research of 350,000 Mobile Apps across 90 App Stores Reveals 40,000 Containing Malware or Suspicious Binaries
SQL Injection Vulnerabilities Surge
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Distil Networks Acquires ScrapeSentry to Add 24/7 Security Ops Center
Products and Releases  |  1/13/2015  | 
New Managed Security Service Evaluates and Responds to Bot Threats in Real-Time Based on Each Customers Unique Security Policy and Response Plan
Websense Transformation Delivers New TRITON APX 8.0 Platform
Products and Releases  |  1/13/2015  | 
Websense Addresses Skills Gap with TRITON APX 8.0, the Result of 18 Months of Business Transformation & Innovation.
EyeLock's myris Is First and Only Iris Authenticator for New FIDO Open Industry Standard
Products and Releases  |  1/5/2015  | 
FIDO Ready(TM) certified device for universal strong authentication, myris provides consumers and enterprises with unprecedented security
Silent Circle Appoints Bill Conner CEO
Products and Releases  |  1/5/2015  | 
Former Entrust CEO, Nortel President Also Joins Board of Directors of Silent Circle, Blackphone


Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/22/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.