Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in October 2013
<<   <   Page 2 / 3   >   >>
Cyberoam NetGenie Launches Wireless VDSL2/ADSL2+ Appliances To Secure Home And SOHO Networks
Products and Releases  |  10/21/2013  | 
Routers also support cable Internet and 3G USB modem Internet connection
Kroll Global Fraud Report Reveals Significant Surge In Corporate Fraud
Products and Releases  |  10/21/2013  | 
Overall, 70 percent of companies were affected by fraud in the past 12 months
ClickTime Partners With OneLogin To Streamline Web Timesheet Security
Products and Releases  |  10/21/2013  | 
ClickTime to provide integrated Single Sign-On (SSO) offerings
Arbor Networks And Google Ideas Collaborate On DDoS Visualization
Products and Releases  |  10/21/2013  | 
Digital Attack Map is updated daily, and historical data can be viewed for all countries.
Etisalat And MasterCard Team
Products and Releases  |  10/21/2013  | 
Companies look to the future of mobile payments with new technology
Skycure Launches Mobile Security Solution For iOS Devices
Products and Releases  |  10/20/2013  | 
Solution is installed as an application on end users' phones or other devices
Webroot Enhances Mobile Threat Protection To Secure Corporate Data And Strengthen BYOD Policies
Products and Releases  |  10/20/2013  | 
Webroot SecureAnywhere Business - Mobile Protection includes an enhanced device scanning engine for Android
Study Reveals Shortage Of IT Security Talent Equals Abundance Of Risk
Products and Releases  |  10/20/2013  | 
Half of IT and business leaders surveyed believe shortage of qualified security talent is exposing their organizations to serious risk, according to TEKsystems
NetCitadel Develops New Approach For Real-Time Security Incident Response To Advanced Persistent Threats And Malware Attacks
Products and Releases  |  10/20/2013  | 
Solution entails analytics-driven, context-aware approach
HITRUST Releases Draft Privacy Controls For The HITRUST CSF
Products and Releases  |  10/18/2013  | 
Integrated framework protects patient privacy while supporting the flow of health data
Protect Electronic Devices With Secure Authenticator's Strong Symmetric-Key Cryptography
Products and Releases  |  10/18/2013  | 
DeepCover guards embedded designs, peripherals, or sensors with bidirectional challenge-and-response SHA-256 authentication and encryption
NT OBJECTives Inc. Unveils Continuous Scanning
Products and Releases  |  10/18/2013  | 
Program monitors for any change in a Web application
StrikeForce Technologies Announces GuardedID Mobile
Products and Releases  |  10/18/2013  | 
SDK enables Apple and Android developers to embed StrikeForce's Keystroke Encryption technology into their mobile applications
Bay Dynamics Launches Latest Version Of Risk Fabric
Products and Releases  |  10/18/2013  | 
Identifyies risks and potential security events based on employee activities and patterns of behavior
1 In 5 Employees Will Open Suspicious Email And Fail To Notify IT, Says Courion Research
Products and Releases  |  10/18/2013  | 
In addition, 23 percent of office workers don't understand why their employers makes them change passwords so often
CSA Releases Expanded Cloud Controls In New CCM V.3
Products and Releases  |  10/18/2013  | 
New version also includes improved harmonization with the Security Guidance for Critical Areas of Cloud Computing v3
Onapsis Supports SAP HANA
Products and Releases  |  10/17/2013  | 
Onapsis X1 detects insecure SAP ABAP and Java configurations
New Study: Half Of Federal Agency Security Breaches Caused By Lack Of User Compliance
Products and Releases  |  10/17/2013  | 
MeriTalk study compares what cybersecurity pros report about their agencies' security with what end users -- federal workers -- actually experience
ID Experts Rolls Out New Version Of RADAR
Products and Releases  |  10/16/2013  | 
RADAR 3.0 is for covered entities and insurance companies to better manage privacy and security incidents involving PHI and PII
ForeScout Introduces The ControlFabric Platform For Interoperability And Continuous Monitoring And Mitigation
Products and Releases  |  10/16/2013  | 
Enables IT security products to dynamically share information
Malwarebytes Launches Android App To Tackle Mobile Malware And Privacy Threats
Products and Releases  |  10/16/2013  | 
Malwarebytes Anti-Malware Mobile, available on Google Play, protects Android phones and tablets from malware, infected apps and unauthorized surveillance
Akamai Releases Second Quarter 2013 State Of The Internet Report
Products and Releases  |  10/16/2013  | 
Number of DDoS attacks increases by 54 percent over first quarter
Klocwork Insight Helps Automotive Industry Secure Their Code
Products and Releases  |  10/16/2013  | 
Many vehicles now have more than 100 million lines of software code in their on-board systems
ESET Releases Version 7 Of ESET NOD32 Antivirus And ESET Smart Security
Products and Releases  |  10/16/2013  | 
New features include Exploit Blocker, Advanced Memory Scanner, Vulnerability Shield, and ESET Social Media Scanner
CounterTack Announces $12M Series B Round Of Funding
Products and Releases  |  10/16/2013  | 
CounterTack's Sentinel and Scout solutions provide real-time threat detection and visibility into attacker behaviors
Mocana Purges NSA-Compromised Key-Generation Scheme From Its NanoCrypto Embedded Security Engine
Products and Releases  |  10/16/2013  | 
NIST previously promoted the algorithm as a cryptographically secure key generation method
New Wisegate Report Shares How CISOs Are Winning Executive Buy-In For Security Budgets
Products and Releases  |  10/15/2013  | 
"CISOs Discuss Best Ways to Gain Budget and Buy-in for Security" focuses on three key areas to help CISOs successfully navigate the budgeting process
AVAST Releases avast! 2014
Products and Releases  |  10/15/2013  | 
Solution offers a new Do Not Track function
Information Security Forum World Congress Coming November 3
Products and Releases  |  10/15/2013  | 
More than 750 security experts are expected to attend
BullGuard Launches New Version Of Internet Security Software Suite
Products and Releases  |  10/15/2013  | 
BullGuard Internet Security features improved behavioral detection engine
New Cloud Service Combines Safe Social
Products and Releases  |  10/15/2013  | 
My Cloud Storage service gives Sgrouples members a dashboard-style control over shared content
Raytheon Survey Finds Cybersecurity Talent Pipeline Not Being Fed By High Schools
Products and Releases  |  10/15/2013  | 
Survey finds less than one-quarter of young adults express interest in a career in this field
ABA Provides Identity Fraud Prevention Tips To Consumers
Products and Releases  |  10/15/2013  | 
For many victims, fruad can result in drained bank accounts, poor credit, and a damaged reputation
NQ Mobile Discovers 'Copycat App' Malware; Hits Android Users Across China And SE Asia
Products and Releases  |  10/15/2013  | 
The app, identified as a.frau.longjian.a, appears to Android users as an update of NetDragon 91 Assistant app
ForeScout And Splunk Team On Big Data And Security Intelligence
Products and Releases  |  10/15/2013  | 
ForeScout has made available bidirectional integration between ForeScout CounterACT and Splunk Enterprise and a new ForeScout App for Splunk Enterprise
TeleSign Unveils Authentication App And Secure Two-Way SMS
Products and Releases  |  10/15/2013  | 
AuthID authenticates users' logins and online transactions
New Barracuda NG Firewall F600 Models Launched
Products and Releases  |  10/15/2013  | 
Five models feature new, multiple port options and hot-swappable power supplies to accommodate varying network requirements
ITADSecurity Offers Free WatchDog SnapShot For Combating Corporate Rogue Devices
Products and Releases  |  10/15/2013  | 
Provides enterprisewide visibility into devices evading detection on company networks
CipherCloud Delivers Searchable Strong Encryption
Products and Releases  |  10/15/2013  | 
Searchable Strong Encryption (SSE) solution enables encryption of information in real time before it's sent to the cloud
Riskive Unveils Free App For Social Identity Theft Protection
Products and Releases  |  10/14/2013  | 
FriendGuard is company's first consumer-facing product
BYOD Will Always Be Trade-Off Between Convenience And Security, Says Context
Products and Releases  |  10/11/2013  | 
New research highlights limitations of leading mobile device management solutions
Simplexo Recognized For Driving Secure Search Technology To The Forefront Of Cloud Computing
Products and Releases  |  10/11/2013  | 
Simplexo technology provides secure universal access to electronic content
Trend Micro Acquires Broadweb To Enhance Network Protection Against Targeted Attacks And Advanced Threats
Products and Releases  |  10/10/2013  | 
Technology integrates with existing capabilities for custom defense capabilities
Identity Finder Discovers Google Chrome Users Are Vulnerable To Sensitive Data Theft
Products and Releases  |  10/10/2013  | 
Google Chrome cache file stores unencrypted personal information without Web users' knowledge
AuthEntry Releases Multipurpose, Multifactor Authentication Technology
Products and Releases  |  10/10/2013  | 
Secures vulnerable usernames and passwords, and physical and logical entry points
Lookout Closes $55M In Strategic Financing From Deutsche Telekom, Qualcomm, Greylock Ventures And Mithril Capital Management
Products and Releases  |  10/10/2013  | 
Capital will be used to continue international expansion
Bitdefender Launches GravityZone-In-A-Box
Products and Releases  |  10/9/2013  | 
GravityZone-in-a-Box secures up to 250 endpoints for SMBs
AVG And Yandex Deliver Mobile Security To Customers With Android Devices
Products and Releases  |  10/9/2013  | 
AVG AntiVirus PRO v3.3 protects mobile devices from viruses, malware, spyware, and online exploitation in real time
New Global Privacy Network Marks New Dawn For The Internet
Products and Releases  |  10/9/2013  | 
idcloak Technologies network is built from VPN tunneling technology
ENISA White Paper: Can We Learn From Industrial Control Systems/SCADA Security Incidents?
Products and Releases  |  10/9/2013  | 
Offers four key points for a proactive learning environment
<<   <   Page 2 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-06-27
A vulnerability was found in Analytics Stats Counter Statistics Plugin and classified as critical. This issue affects some unknown processing. The manipulation leads to code injection. The attack may be initiated remotely.
PUBLISHED: 2022-06-27
Information Exposure vulnerability in My Account Settings of Devolutions Remote Desktop Manager before 2022.1.8 allows authenticated users to access credentials of other users. This issue affects: Devolutions Remote Desktop Manager versions prior to 2022.1.8.
PUBLISHED: 2022-06-27
A potential security vulnerability has been identified in HPE StoreOnce Software. The SSH server supports weak key exchange algorithms which could lead to remote unauthorized access. HPE has made the following software update to resolve the vulnerability in HPE StoreOnce Software 4.3.2.
PUBLISHED: 2022-06-27
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v0.11.0 are vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or UI. The vulnerabilities are due to the use of insufficiently random values in paramete...
PUBLISHED: 2022-06-27
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a `javascript:` link in the UI. When clicked by a victim user, the script will execute with th...