Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in November 2013
<<   <   Page 3 / 3
Vaultive Announces Extension Of Cloud Encryption Platform To Box, Yammer & Other Enterprise Apps
Products and Releases  |  11/5/2013  | 
Vaultive Platform 3.4 supports persistent encryption of data stored and processed by major enterprise cloud applications
Tripwire Announces Technology Partnership And Integration With RedSeal Networks
Products and Releases  |  11/5/2013  | 
Partnership provides mutual customers with comprehensive threat and vulnerability risk management
Intel selects Wave to manage New Solid-State Drives For Greater Security, Performance
Products and Releases  |  11/5/2013  | 
Self-encrypting solid-state drives are part of the Intel Solid-State Drive Professional Family
FBI Seeks Information Regarding Several Cyber Fugitives
Products and Releases  |  11/5/2013  | 
Rewards are being offered for information that leads to the arrest of five additions to Cyber's Most Wanted list
Black Hat: Black Hat Asia 2014 Registration Now Open
Products and Releases  |  11/5/2013  | 
Event will be in Singapore, March 25-28, 2014
Shape Security Adds Execs From Palo Alto Networks, Sencha And Mozilla To Expand Exec Bench
Products and Releases  |  11/4/2013  | 
Mark Rotolo, Michael Coates, and Dr. Ariya Hidayat join Web security technology startup
ThreatSim's State Of The Phish Finds Most Organizations Do Not Recognize Phishing As A True Threat
Products and Releases  |  11/4/2013  | 
The key finding: most organizations (57%) rate phishing as a 'minimal' impact threat
CoverMe, Private Texting, Document Sharing, And Secure Phone Call App, Launches With Over 500,000 Users
Products and Releases  |  11/4/2013  | 
CoverMe uses an encrypted data connection to transmit phone calls, messages, and photos and videos
Triumfant Launches Memory Process Scanner Module To Detect And Stop In-Memory Attacks
Products and Releases  |  11/4/2013  | 
Solution provides real-time detection, identification, and mitigation of advanced malware that operates in endpoint volatile memory
(ISC)2 Introduces New Healthcare Security And Privacy Certification
Products and Releases  |  11/4/2013  | 
Establishes global standard of competency for health-care information security and privacy practitioners
Bogus Bank Emails Leave Brits At Risk
Products and Releases  |  11/4/2013  | 
According to a Kaspersky Lab study, 47 percent of users have received bogus email allegedly coming from a bank
Solutionary Q3 Threat Intel Report: Phishing, Tor, Hacktivism And Spike In Suspicious Traffic
Products and Releases  |  11/4/2013  | 
Among the key findings, Tor traffic increased by 350 percent
Centrify Delivers Unified Identity Solution For SaaS And Mobile Management For The Workplace
Products and Releases  |  11/4/2013  | 
Centrify User Suite, SaaS Edition, provides Active Directory- and/or cloud-based Single Sign-on
Sprint And Mako Networks To Offer PCI-compliant Solution For Businesses
Products and Releases  |  11/4/2013  | 
Mako System will be added to Sprint's portfolio of solutions for retailers and distributed enterprises
Majority Of Retail Sector Does Not Meet New PCI Standards
Products and Releases  |  11/3/2013  | 
Only 41 percent of the retail sector uses penetration testing to identify security risks
Shred-it Promotes Fraud Prevention: Provides Tips For Protecting Information In Recognition Of International Fraud Awareness Week
Products and Releases  |  11/1/2013  | 
It is increasingly important that consumers and organizations protect their confidential information
Protection Tools Enhanced For QuickLicense 7, Windows 8.1 And Mavericks
Products and Releases  |  11/1/2013  | 
Excel Software has updated a suite of protection and licensing tools
<<   <   Page 3 / 3


Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26250
PUBLISHED: 2020-12-01
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by ...
CVE-2020-28576
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.
CVE-2020-28577
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.
CVE-2020-28582
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.
CVE-2020-28583
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.