Products and Releases

Content posted in January 2015
IBM Research Announces Cloud Breakthrough For Protecting Personal Data
Products and Releases  |  1/28/2015  | 
Sophisticated cryptographic algorithm can prevent unwanted sharing of personal data, including credit card numbers
ZeroFOX Acquires Vulnr
Products and Releases  |  1/28/2015  | 
ZeroFOX accelerates growth through the acquisition of stealth-mode security company Vulnr
Proofpoint Releases Enterprise Protection Suite 8.0, Advances Email Security Leadership
Products and Releases  |  1/28/2015  | 
Enhancements include cloud-based email continuity, S/MIME encryption, SAML single sign-on and Sendmail MTA
Virtru Announces General Availability of its Encrypted Email and Digital Privacy Service
Products and Releases  |  1/28/2015  | 
Free End-to-End Email Encryption Available Forever; Advanced Control Features for Businesses Now Available in Virtru Pro
New Patent Eliminates Passwords
Products and Releases  |  1/28/2015  | 
Patented technology from TextPower verifies your identity while simplifying website logins; introduces SnapID that replaces usernames and passwords
Verizon Announces Security Enhancement for IoT Deployments
Products and Releases  |  1/28/2015  | 
Managed Certificate Services platform is designed to authenticate objects and machines and secure data transmitted between these connections
Ed Survey Results: Insider Threats
Products and Releases  |  1/28/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources
CYBERTECH SPONSORING DATA PRIVACY DAY 2015: SECURING THE INTERNET OF THINGS NATIONAL SEMINAR
Products and Releases  |  1/27/2015  | 
Invitation-only Event Will Take Think Tank Approach to Possible Solutions
15th Member of Washington, D.C.-Based Identity Theft Ring Pleads Guilty
Products and Releases  |  1/26/2015  | 
Defendant Admits To Targeting Parents Of Hospitalized Children, Among Others
Ad Networks Just Got More Secure
Products and Releases  |  1/26/2015  | 
New ad network puts users first, combines beautiful user experience with best in class privacy controls
SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity
Products and Releases  |  1/26/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources; SolarWinds Examines Policies, Processes and Threat Prevention Tools to Address Lack of Internal Visibility
New GHOST Vuln Affecting Linux
Products and Releases  |  1/26/2015  | 
High Severity Vulnerability Found in Linux GNU C Library Gives Attackers Control without System Credentials; Patches Available Today
Bitglass Breach Discovery Limits Damage From Data Breaches
Products and Releases  |  1/21/2015  | 
Automated Service Enables Enterprises to Discover Data Breaches Early
Adroit Digital Study Reveals Consumer Data Privacy and Security Concerns as President Obama Talks Cybersecurity in State of the Union
Products and Releases  |  1/21/2015  | 
70% believe the government isnt protecting their online privacy; a majority are most concerned about privacy and security on social media
Updated for 2015: Tools Designed to Manage Third Party Risk
Products and Releases  |  1/21/2015  | 
Shared Assessments Program Tools Empower Vendor Management Confidence
Vormetrics 2015 Insider Threat Report: 93% of U.S. Organizations Polled Vulnerable to Insider Threats
Products and Releases  |  1/21/2015  | 
Report Follows Record Year of Data Breaches; Reveals Spending Priorities, Security Risks
Online Trust Alliance Determines Over 90 Percent of Data Breaches in First Half of 2014 Could Have Been Easily Prevented
Products and Releases  |  1/21/2015  | 
Findings in newly released OTA Data Protection Best Practices and Risk Assessment Guides
ForgeRock and FireEye Join Forces to Detect Cyber Attacks with Identity-Aware Threat Intelligence Solution
Products and Releases  |  1/21/2015  | 
Integration of FireEye Threat Analytics Platform and the ForgeRock Identity Platform to Enable Organizations to Correlate Identity-Based Intrusions with Enterprise-wide Threat Indicators
RiskIQ Finds More Than 11 Percent of Android Banking and Finance- Related Apps are Suspicious
Products and Releases  |  1/21/2015  | 
Research of 350,000 Mobile Apps across 90 App Stores Reveals 40,000 Containing Malware or Suspicious Binaries
SQL Injection Vulnerabilities Surge
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Distil Networks Acquires ScrapeSentry to Add 24/7 Security Ops Center
Products and Releases  |  1/13/2015  | 
New Managed Security Service Evaluates and Responds to Bot Threats in Real-Time Based on Each Customers Unique Security Policy and Response Plan
Websense Transformation Delivers New TRITON APX 8.0 Platform
Products and Releases  |  1/13/2015  | 
Websense Addresses Skills Gap with TRITON APX 8.0, the Result of 18 Months of Business Transformation & Innovation.
EyeLock's myris Is First and Only Iris Authenticator for New FIDO Open Industry Standard
Products and Releases  |  1/5/2015  | 
FIDO Ready(TM) certified device for universal strong authentication, myris provides consumers and enterprises with unprecedented security
Silent Circle Appoints Bill Conner CEO
Products and Releases  |  1/5/2015  | 
Former Entrust CEO, Nortel President Also Joins Board of Directors of Silent Circle, Blackphone


6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.