Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in October 2012
Page 1 / 2   >   >>
EMC to Acquire Web Fraud Detection And Security Software Provider Silver Tail Systems
Products and Releases  |  10/30/2012  | 
Developer of Big Data-driven Solutions to Join RSA Security Division
SIA Securing New Ground Conference Postponed
Products and Releases  |  10/29/2012  | 
SIA Security Week events postponed as a result of Hurricane Sandy
WatchGuard Announces Seventh Straight Quarter Of Double-Digit Growth
Products and Releases  |  10/26/2012  | 
WatchGuard credits much of its Q3 success to its newly updated XTM 5 Series UTM appliances
LANDesk Delivers Secure User Management Suite
Products and Releases  |  10/26/2012  | 
Solution set is aimed at helping IT professionals gain control of a mixed environment of users, devices, and platforms
Panda Security Certified Compatibility With Windows 8
Products and Releases  |  10/26/2012  | 
2013 products and free Panda Cloud Antivirus have received ‘Windows 8 compatible’ certifications
Centrify Introduces Mobile Authentication Services
Products and Releases  |  10/26/2012  | 
Centrify is also enabling developers of cloud, mobile, and SaaS-based offerings to take advantage of Centrify’s Mobile Authentication Services
Commtouch Q3 Internet Threats Trend Report Highlights Increase In Android Malware
Products and Releases  |  10/26/2012  | 
Report also found 87 billion daily spam/phishing emails sent
Alert Logic Reports Strong Q3 2012 Results
Products and Releases  |  10/26/2012  | 
Company achieves 43% year-over-year growth
Survey: 38% Of SMB professionals Must Run Telnet
Products and Releases  |  10/25/2012  | 
Respondents were asked how their companies handled five insecure network configurations
DeTron Inc. Announces Debut Of Secure Smartphone
Products and Releases  |  10/25/2012  | 
De Fens is an Android device integrated with QDK technology via a built-in IC chip
Websense Reports Third Quarter 2012 Results
Products and Releases  |  10/25/2012  | 
Financial highlights include revenues of $90.4 million
Cloud Security Alliance Guidance For Data Ownership and Control Best Practices Emphasizes Importance Of Encryption Of Data-In-Us
Products and Releases  |  10/25/2012  | 
Guidance aligns with Vaultive’s approach of implementing three states of cloud data encryption
AlienVault Launches Threat Intelligence Resource Center & iOS Mobile Apps
Products and Releases  |  10/25/2012  | 
AlienVault Open Minds Exchange provides, tools, and insights from the AlienVault security experts and community
Symantec Reports Q2 FY2013 Result
Products and Releases  |  10/25/2012  | 
GAAP revenue for the fiscal second quarter was $1.7 billion
Court To Notify Current And Former Norton Customers About $10 Cash Refunds For Antivirus Software Upgrades And Renewals
Products and Releases  |  10/25/2012  | 
Products included in the settlement are Norton AntiVirus, Norton Internet Security, Norton 360, Norton Personal Firewall, and Norton SystemWorks
RIT Creates New Computing Security Department
Products and Releases  |  10/24/2012  | 
RIT’s faculty seeks to define computing security as a new discipline rather than a specialization within another field
Qualys Introduces Predictive Analytics Engine For Zero-Day And Microsoft Patch Tuesday Vulnerabilities
Products and Releases  |  10/24/2012  | 
QualysGuard Vulnerability Management will now feature vulnerability prediction capabilities within a new dashboard
Siemens Awarded Certification For Cyber Security Threat Protection
Products and Releases  |  10/23/2012  | 
Siemens meets industry benchmarks for device manufacturers' security processes and practices
FireHost Q3 Web Application Report -- XSS Attacks Lead Pack As Most Frequent Attack Type
Products and Releases  |  10/22/2012  | 
FireHost categorizes four attack types, in particular, as representing the most serious threat
WatchGuard Creates Self-Configuring UTM Security Appliance
Products and Releases  |  10/22/2012  | 
RapidDeploy eliminates need for IT security professionals to preconfigure devices or travel to site for installation
CloudLock Introduces Application Firewall For Google Apps
Products and Releases  |  10/22/2012  | 
CloudLock Apps Firewall helps enterprises discover, classify and enable trusted third-party mobile and Web apps that require access to users’ Google Apps accounts and data
Prolexic Releases Online DDoS Downtime Calculator
Products and Releases  |  10/22/2012  | 
Calculator takes into consideration many DDoS attack variables that affect revenue
Lieberman Software Privileged Identity Management Product SAP-Certified
Products and Releases  |  10/19/2012  | 
Enterprise Random Password Manager has achieved SAP certification
ILANTUS Technologies Expands Presence In Identity Management Market
Products and Releases  |  10/19/2012  | 
Express Initiative delivers hybrid identity and security solutions
eleven E-Mail Security Report October 2012: Soaring Increase In Drive-by Attacks And Malware E-mails
Products and Releases  |  10/19/2012  | 
Decline in spam levels in September due to the absence of major waves from Saudi Arabia
Increasing Size Of Individual DDoS Attacks Define Third Quarter, According To Prolexic’s Report
Products and Releases  |  10/19/2012  | 
During Q3, Prolexic mitigated seven DDoS attacks of more than 20 Gbps
Password Express Delivers Secure, Self-Service Password Management In The Cloud
Products and Releases  |  10/19/2012  | 
Ilantus Technologies unveils password management solution with strong security and enterprise integration
Law Firm Bernstein Shur Launches Data Security Team
Products and Releases  |  10/19/2012  | 
Attorneys to provide clients with legal and technical support before and after a data security breach
Goode Intelligence Finds Mobile Banking Could Be More Secure Than Traditional Online Banking
Products and Releases  |  10/19/2012  | 
Report shows opportunity for banks to benefit from the immediacy that smart mobile devices (SMDs) offer
Palo Alto Networks Prices Secondary Public Offering
Products and Releases  |  10/19/2012  | 
All shares will be sold by existing stockholders
Are Next-Generation Firewalls Ready For The Enterprise?
Products and Releases  |  10/19/2012  | 
NSS Labs released results and analysis from its 2012 Group Test for Next Generation Firewall
Almost 80% Believe Free Wi-Fi Can Lead To Identity Theft, Study Finds
Products and Releases  |  10/18/2012  | 
A recent survey by the Identity Theft Resource Center in conjunction with PRIVATE WiFi indicates that a personal VPN is your best line of defense
CipherCloud Survey Shows Data Security, Privacy, And Other Concerns Delaying or Stopping Cloud Implementations at 66% of Organizations Polled
Products and Releases  |  10/18/2012  | 
Worries over data leakage topped the list with 52 percent of respondents
Gartner: Prepare For IT Supply Chain Integrity And Online Infrastructure To Get Pwned
Products and Releases  |  10/18/2012  | 
New report details how, why and to what extent enterprise IT supply chains will be targeted and compromised in the near future
Seculert Brings Big Data Analytics to Forefront of Malware Detection
Products and Releases  |  10/18/2012  | 
Seculert Sense identifies advanced persistent threats and unknown malware
Elavon & 41st Parameter Deliver Comprehensive Commerce Solution To Mitigate Fraudulent Transactions
Products and Releases  |  10/18/2012  | 
FraudNet enables online merchants to reduce fraud, operating costs
BSA Statement On White House Engagement With Industry On Cybersecurity Policy
Products and Releases  |  10/17/2012  | 
Listening session gives stakeholders an opportunity to air practical considerations
Thales Intros World's Fastest Elliptic Curve HSMs
Products and Releases  |  10/17/2012  | 
nShield Connect 6000+, nShield Solo 6000+ help organizations embrace encryption and security capabilities
Secure64 Releases Enhanced Version Of DNS Management Software
Products and Releases  |  10/17/2012  | 
New capabilities unify management of entire Secure64 DNS product suite from a single application
Experian And Iovation Collaborate To Prevent Fraud With Identity Verification And Device Reputation
Products and Releases  |  10/17/2012  | 
Integrated offering will use Experian's Precise IDSM platform
Webroot Partners With Facebook
Products and Releases  |  10/17/2012  | 
Facebook users can protect themselves against cybercriminals in two ways
Sophos Provides Solution For Vulnerability On Android Devices
Products and Releases  |  10/17/2012  | 
Sophos Mobile Security gives Android users protection against USSD special codes
Akamai Releases Second Quarter 2012 'State Of The Internet' Report
Products and Releases  |  10/17/2012  | 
Akamai observed attack traffic from 188 unique countries/regions during the second quarter of 2012
McAfee Launches New Data Center Security Suites
Products and Releases  |  10/17/2012  | 
Suites offer combination of whitelisting, blacklisting, and virtualization technologies for protecting servers and virtual desktops
80% Of Consumers Want Control Over Information Collected By Data Brokers
Products and Releases  |  10/16/2012  | 
Responses to TrustedID survey shed light on confusing and elusive nature of data broker companies
LogRhythm Adds New Layer To Its SIEM 2.0 Big Data Security Analytics Platform
Products and Releases  |  10/16/2012  | 
Enables organizations to baseline normal, day-to-day activity across multiple dimensions of the enterprise
Rapid7 Announces 3 New Magnificent7 Sponsorships
Products and Releases  |  10/16/2012  | 
Magnificent7 Program supports innovative open-source projects in the security industry
HID Global Identity Assurance partners With Precise Biometrics To Deliver Strong Authentication For iOS
Products and Releases  |  10/16/2012  | 
New solution combines ActivClient Mobile Software Development Kit (SDK) for iOS with two sleeves from Precise Biometrics
Radware Launches New 'DDoS Warriors' Site
Products and Releases  |  10/16/2012  | 
Provides comprehensive analysis on DoS and DDoS attack tools, trends, and threats
Arbor Networks Introduces Pravail Network Security Intelligence (NSI) Solution For Advanced And Insider Threats
Products and Releases  |  10/16/2012  | 
Pravail NSI helps close security gaps left by firewalls and intrusion prevention systems
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file