Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in November 2010
<<   <   Page 2 / 2
CyberAngel Gets An Upgrade
Products and Releases  |  11/15/2010  | 
New version provider stronger data encryption, new data transfer protection
Stop. Think. Connect. Campaign Launches National Cybersecurity Public Service Announcement Challenge
Products and Releases  |  11/15/2010  | 
Stop. Think. Connect. is a national public awareness effort coordinated by the DHS
BitDefender Launches Free Antispam Product For Linux Servers
Products and Releases  |  11/12/2010  | 
Free Antispam for Linux Mail Servers uses NeuNet technology
SonicWALL First Company To Receive Enterprise Firewall Certification From ICSA Labs
Products and Releases  |  11/12/2010  | 
Certification covers entire SonicWALL E-Class Network Security Appliance (NSA) series
CyberSource Partners With Trustwave
Products and Releases  |  11/12/2010  | 
TrustKeeper PCI facilitates PCI DSS compliance validation
Fortrex Technologies Backs PCI DSS And PA-DSS 2.0 Compliance
Products and Releases  |  11/12/2010  | 
Standards offer improved alignment, clarifications, and guidance
CA Rolls Out Enhanced DLP, ID Management Products
Products and Releases  |  11/10/2010  | 
Aannouncement includes new capabilities in CA DLP and CA Identity Manager for the distributed environment, and new releases of CA ACF2 and CA Top Secret for the mainframe platform
AVG Technologies To Acquire DroidSecurity
Products and Releases  |  11/9/2010  | 
DroidSecurity’s mobile security app, antivirus free, surpassed the 4.5 million download milestone
Barracuda Networks Offers Security Bug Bounty Program
Products and Releases  |  11/9/2010  | 
Initiative rewards researchers who identify and report security vulnerabilities in the company's security product line
Lieberman Identity Management For Dell Servers
Products and Releases  |  11/9/2010  | 
Solution builds upon the existing security of DRAC products
Afilias Improves Security For .IN Domain With DNSSEC
Products and Releases  |  11/9/2010  | 
DNSSEC protects the DNS from cache-poisoning exploits
Go Daddy's Site Scanner Detects Holes
Products and Releases  |  11/9/2010  | 
Product locates website security weaknesses and provides suggestions to fix them
Palisade Systems And Accellion Partner To Offer Integrated DLP And Secure File Transfer In The Cloud
Products and Releases  |  11/9/2010  | 
Partnership enables SMBs to prevent security breaches at the file transfer source
Fortinet Ships FortiMail 3000C Messaging Security Appliance
Products and Releases  |  11/9/2010  | 
FortiMail now has the ability to run in "server” mode
Dell, Symantec Expand Strategic Partnership To Deliver Cloud-Based SaaS Solutions
Products and Releases  |  11/8/2010  | 
Dell Services will use Symantec's e-mail security platform as the security engine for its Email Management Services portfolio of SaaS solutions
AV-Comparatives Adds Malware Analysis Appliance
Products and Releases  |  11/8/2010  | 
AV-Comparatives will use the ValidEdge MIS 1100 to perform detail analysis of malware samples
GeoTrust Cuts SSL Certificate Prices By 50%
Products and Releases  |  11/8/2010  | 
Go Daddy customers can trade in their Go Daddy SSL certificates for equivalent GeoTrust SSL certificates at no charge
Perimeter E-Security Appoints Andrew Jaquith As Chief Technology Officer
Products and Releases  |  11/8/2010  | 
Jaquith will spearhead Perimeter's technology strategy
iPhone 4 Spy Software Hits The Market
Products and Releases  |  11/8/2010  | 
Retina-X Studios releases Mobile Spy for Apple iPhone 4 devices
TrustDefender And Gulf Business Machines (GBM) Team Up In Anti-Fraud
Products and Releases  |  11/8/2010  | 
Companies to address market demand in the GCC and Pakistan
Gozi Trojan Variant Evades AV
Products and Releases  |  11/5/2010  | 
TrustDefender Labs analysis shows increasing threats of Trojans
Trend Micro Global Survey Reveals Data Loss Among The Biggest Concern For Small Businesses
Products and Releases  |  11/4/2010  | 
While viruses and Trojans are still the top runners, small businesses are becoming more worried about losing important data
Security Industry Association Members Elect Four New Directors
Products and Releases  |  11/4/2010  | 
In addition, SIA members re-elected five incumbent directors
eScan Launches New Anti-Virus And Content Security Solution
Products and Releases  |  11/4/2010  | 
eScan 11 includes advanced weapons against highly evolved threats
Lookout Mobile Security Launches Premium Android Security Product
Products and Releases  |  11/4/2010  | 
Lookout Premium adds advanced security and privacy protection via the new Privacy Advisor
Trend Micro Enhances Small Business Flagship Line With Data Loss Prevention And Mac Client Protection
Products and Releases  |  11/4/2010  | 
Worry-Free Business Security 7 incorporates new features that address the ways small businesses are changing
GateProtect Now Blocks Stuxnet
Products and Releases  |  11/4/2010  | 
New update is available via the gateProtect Update Center
New BitLocker Manager For Windows 7
Products and Releases  |  11/4/2010  | 
Set of tools are for the central management of Microsoft’s native encryption application
Industry Leaders Publish Reference Architecture For PCI DSS 2.0 Compliant Clouds
Products and Releases  |  11/4/2010  | 
HyTrust, Cisco, VMware, Savvis, and Coalfire outline configuration guidelines
Cyber-Ark Rolls Out New Secure Email Manager
Products and Releases  |  11/4/2010  | 
Secure Email Manager integrates directly with Microsoft Outlook
Mobile Nanny Monitors, Filters Android Traffic
Products and Releases  |  11/4/2010  | 
Retina-X Studios' application allows parents to see every action their child performs in an online account
RSA Unveils New Solution To Deliver End-To-End Data Security
Products and Releases  |  11/4/2010  | 
RSA Data Protection Manager combines tokenization and application encryption
ActivIdentity Launches Management Appliance To Stop Password-Gathering Malware
Products and Releases  |  11/3/2010  | 
Credential management appliance aimed at midsize companies
Colorado Supreme Court Ruling Over SSN Fraud Opens Dangerous Door, ITRC Says
Products and Releases  |  11/3/2010  | 
Identity Theft Resource Center concurs with the three dissenting judges
Veracode, Proactive Risk Partner On Application Security Testing
Products and Releases  |  11/3/2010  | 
Companies will deliver policy-driven programs for ongoing application security verification
Sentrigo And Amazon Team Up In Cloud-Based Database Security
Products and Releases  |  11/3/2010  | 
Sentrigo Hedgehog Enterprise and vPatch solutions now available on Amazon Elastic Compute Cloud
Brinqa GRC Platform 3.0 Simplifies Governance, Risk, And Compliance
Products and Releases  |  11/2/2010  | 
Brinqa GRC Platform 3.0 provides capabilities for policy and compliance management
Fortinet: Money Mule, Zeus Risks On The Rise
Products and Releases  |  11/2/2010  | 
Company releases October 2010 Threat Landscape report
CIS Releases Updated Consensus IT Security Metrics And Quick Start Guide
Products and Releases  |  11/2/2010  | 
CIS Metrics feature eight new metrics to address industry needs, such as Incident Impact and Configuration Compliance
eNom Updates Website Security Offering With Comodo SSL
Products and Releases  |  11/2/2010  | 
Updates effective immediately
MAAWG Develops First Industry Best Practices For Protecting Web Messaging Consumers
Products and Releases  |  11/2/2010  | 
Also issues practices for email-complaint feedback loops and evaluating anti-abuse products for email operators
EMC Expands Automated Data Protection For Private Clouds
Products and Releases  |  11/2/2010  | 
EMC Data Protection Advisor automates, expands backup and replication monitoring, alerting, and reporting in private clouds
University Of Hawaii Manoa Breach Affects 40,101 Alumni SSNs
Products and Releases  |  11/2/2010  | 
UH-Manoa students are at increased risk of identity theft and fraud
New Free Consumer Mac AV From Sophos
Products and Releases  |  11/2/2010  | 
Sophos Anti-Virus Home Edition for Mac provides automatic on-access detection that runs in the background
Vircom Launches Free Online Security Tool
Products and Releases  |  11/1/2010  | 
Email Security Grader evaluates mail infrastructure weaknesses
Virginia IT Director Sentenced To 27 Months In Prison For Hacking Former Employer's Website
Products and Releases  |  11/1/2010  | 
Darnell H. Albert-El pleaded guilty to one count of intentionally damaging a protected computer without authorization
Emulex Introduces Host-Based Encryption Solution
Products and Releases  |  11/1/2010  | 
Solution improves the data center’s security stance and minimizes the window of data vulnerability
BizCom Web Services Launches SaaS Security Services Through Partnership With McAfee
Products and Releases  |  11/1/2010  | 
Partnership will allow BizCom to offer additional Web security services to its customer base
BitDefender Launches Facebook Security And Privacy App
Products and Releases  |  11/1/2010  | 
BitDefender safego is now being BETA tested on Facebook
New Firewall And NAT Traversal Solution Released For Android
Products and Releases  |  11/1/2010  | 
Eyeball Networks unveils AnyFirewall Engine
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...