Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2008
Page 1 / 3   >   >>
PC Tools: Top Internet Blunders of '08
Products and Releases  |  12/29/2008  | 
A look at the top Internet security blunders during the past year
ESET Teams With Inquira
Products and Releases  |  12/29/2008  | 
Antivirus vendor expects to raise the bar in customer service for the IT Security Industry
Webroot Threat Advisory: Hackers Using Continental Flight 1404 Headlines To Scam Online News-Seekers
Products and Releases  |  12/23/2008  | 
Rogue apps trick users into purchasing phony software and sharing personal information
Comodo Releases EasyVPN Beta
Products and Releases  |  12/23/2008  | 
Comodo EasyVPN beta uses IM clients to access files, PCs
IronKey's New Anti-Worm Malware Protection Battles AutoRun Worms
Products and Releases  |  12/22/2008  | 
Patent-pending technology prevents USB AutoRun worms from infecting corporate and government networks
IT Confidence Drops To Lowest Level In 2008
Products and Releases  |  12/22/2008  | 
More staffing and budget cuts are anticipated in 2009, according to the latest CDW IT Monitor
Prism Microsystems Adds Smart Search To Security Information and Event Management Solution
Products and Releases  |  12/19/2008  | 
Solution combines intelligent analytics to extract meaning from raw logs with free-form intuitive search to extract precise matches from terabyte of data
Cyber Secure Institute Cuts Through Misleading Security Claims: LynuxWorks and LynxSecure
Products and Releases  |  12/19/2008  | 
What LynuxWorks actually said is its system supports EAL 7 evaluation or could be evaluated at that level, says The Cyber Secure Institute
Secerno Makes Enterprise-Class Database Security Available To Branch Offices And SMEs
Products and Releases  |  12/19/2008  | 
Release of Secerno DataWall 3.2 includes two new entry-level versions of Secerno's active database control solution
SECNAP Adds Advanced Reporting Functionality To SpammerTrap Email Security Reporting Package
Products and Releases  |  12/19/2008  | 
Security Gateway provides a robust array of reports for client administrators, as well as several enhanced reports for end users
IronKey Announces New Capabilities To Remotely Protect Secure USB Flash Drives
Products and Releases  |  12/19/2008  | 
IronKey's Trusted Network allows IT administrators to remotely restrict IronKey devices from being used on systems outside specified enterprise IP addressees
Avocado Security Launches Enterprise Edition 2.0 Security & Business Intelligence Optimization Platform
Products and Releases  |  12/19/2008  | 
Solution automates discovery and detection, and analyzes billions of CCTV video surveillance security images
Zero-Day Web Malware Blocks Surpass Yearly Average
Products and Releases  |  12/18/2008  | 
Leading provider of SaaS Web security reports zero-day malware accounted for 26% of blocks in November
Sourcefire Announces EMEA Channel Expansion
Products and Releases  |  12/18/2008  | 
Sourcefire appoints six new strategic partners across EMEA
Nuclear Regulatory Commission Expands Cybersecurity Requirements For Nuke Power Plants
Products and Releases  |  12/18/2008  | 
New rule adds several new requirements as a result of experience in implementing previous security orders and updates the regulatory framework in preparation for the licensing of new nuclear power plants
John Wyatt Named President And CEO Of Cigital
Products and Releases  |  12/18/2008  | 
Wyatt, who has been running Cigital since 2005 as the company's COO, will continue to be responsible for the company's overall management and business strategy
Network Frontiers Releases Media Disposal Toolkit
Products and Releases  |  12/18/2008  | 
Network Frontiers' Media Disposal Toolkit contains everything any organization needs to know about data disposal, presented in a logical actionable format
Sourcefire 3D System 4.8 Now Available On Crossbeam Security Platform
Products and Releases  |  12/17/2008  | 
System provides adaptive intrusion prevention capabilities to secure large enterprise network assets against all forms of security threats
Logica Implements SSH Tectia For Securing City of Helsinki's Financial Apps
Products and Releases  |  12/17/2008  | 
Implementation involves more than 1,300 workstations and application servers to secure file transfers and data connections between workstations and application servers for the City of Helsinki
Beth Israel Medical Center Adds Third Brigade's Server Security
Products and Releases  |  12/17/2008  | 
BIDMC is using the host-based firewall module of Third Brigade Deep Security to create zones of trust within its datacenters
ConSentry Enhances Partner Program
Products and Releases  |  12/17/2008  | 
Announcement includes a series of programs, pricing changes, and tools aimed at broadening opportunities for its networking channel
Fidelis's XPS DLP Solution Adds Passive Data Discovery
Products and Releases  |  12/17/2008  | 
New system version enhances an enterprise's ability to reduce the risks of leakage of protected or sensitive information
SecureMac Releases DNSChanger Trojan Removal Tool 2.0
Products and Releases  |  12/17/2008  | 
Free tool detects and removes new variants discovered since the original tool was released
Palamida Finds Security Tops List Of Concerns Inhibiting Broader Open Source Adoption
Products and Releases  |  12/17/2008  | 
Company highlights 25 open source projects that organizations can use with confidence
GlobalCrypto's RealMe Available As A Flash Web Widget
Products and Releases  |  12/17/2008  | 
RealMe strong authentication software enables a user to upload a photo of their choice and have that picture embedded with cryptographic information unique to the user and Web site
PGP Whole Disk Encryption Approved For Use Within U.K. Goverment
Products and Releases  |  12/16/2008  | 
Baseline approval provides assurance against data loss from laptops and desktops
Canada's NB Power Chooses Waterfall Security Solutions For Network Security
Products and Releases  |  12/16/2008  | 
Waterfall's patent pending solutions enables network segregation ("air gapping") and provide absolute and impenetrable security for critical networks
Rapid7 Launches New 'PartnerFirst' Program
Products and Releases  |  12/16/2008  | 
Program will help partners meet demand for Rapid7 NeXpose vulnerability management for security and compliance
WorkLight And Netvibes Develop New Secure Widget Platform
Products and Releases  |  12/16/2008  | 
Companies taking advantage of these new capabilities can provide consumers with a host of customized tools, ranging from secure RSS feeds and targeted promotional widgets to secure, transactional widgets for managing accounts
Veracode Appoints Jon Stevenson SVP Of Technology And Service Operations
Products and Releases  |  12/16/2008  | 
Stevenson, who held senior management roles at companies such as BMC and HP, is responsible for all aspects of engineering, product management, security research and service delivery
Q1 Labs Unveils Network Security Management Solution For Virtual Environments
Products and Releases  |  12/16/2008  | 
VFlow Collector helps IT pros gain network and application layer visibility into their virtual worlds
Investment Bank Upgrades Global Infrastructure With Palo Alto Networks Firewalls
Products and Releases  |  12/16/2008  | 
Greenhill & Co. adds user-based visibility and policy control of Webmail to reduce risk of regulatory noncompliance
Finjan Creates Advisory Board
Products and Releases  |  12/16/2008  | 
First two members are Gregory Todd Garcia, the first presidentially appointed Assistant Secretary for Cyber Security and Communications at the DHS, and Taher Elgamal, a leading expert in computer, network and information security
Cloudmark Survey: Operators Ignore Mobile Spam
Products and Releases  |  12/15/2008  | 
New research finds that operators anticipate increased mobile spam attacks, but are slow to protect against them
Open Letter From SESTA Calls For Tighter USB Security
Products and Releases  |  12/15/2008  | 
SanDisk Enterprise Solutions Technology Alliance calls on IT professionals to implement improved security for USB storage devices without hampering worker productivity or banning the use of these powerful devices
Core Impact Pro V8 Extends Automated Web App Penetration Testing
Products and Releases  |  12/15/2008  | 
The newest version of Core Security Technologies' flagship security testing software builds on the its range of comprehensive network, endpoint and Web application testing capabilities
LogRhythm Adds Intelligent IT Search To Log Management System
Products and Releases  |  12/15/2008  | 
LogRhythm enhances cryptic raw logs to yield meaning, trends, and anomalies from search results
Business Services For U.S. Immigrants At Extremely High Risk Of Cybercriminal Penetration
Products and Releases  |  12/12/2008  | 
Panda Security assessment finds businesses primarily used by U.S. immigrants to send money back to their home countries to be severely lacking in security measures
Panda Security Reveals Major Security Flaws In Money Transfer Businesses
Products and Releases  |  12/12/2008  | 
Lack of security could allow cybercrooks to obtain users' bank details and empty their accounts
West Coast Labs Completes Anti-Malware Testing, Issues Checkmark Anti-Malware Certification
Products and Releases  |  12/11/2008  | 
17 companies subjected their products to extensive testing to defend against malware attacks authored worldwide; US continues as lead originator of malware attacks against US companies and organizations
Flurry Of Spam Targeting The Federal Bureau Of Investigation
Products and Releases  |  12/11/2008  | 
Consumers continue to be inundated by spam purportedly from the FBI
Monext Chooses Verizon Business Security Solutions to Support Delivery Of Industry-Compliant Bank-Payment Services
Products and Releases  |  12/11/2008  | 
Verizon Business' professional services will enable certification of Monext's processing system
Bit9 Identifies 'The Dirty Dozen' - 2008's Most Popular Applications With Critical Security Vulnerabilities
Products and Releases  |  12/11/2008  | 
Reputable programs found vulnerable; security gaps often left unaddressed
How Companies Can Use IT Security To Protect Against Insider Attacks
Products and Releases  |  12/11/2008  | 
Tough economic times present increased motivation for cybercrime. Experts from Gotham Digital Science share tactics that companies can use to protect against security attacks executed by disgruntled or former employees
Imperva, ArcSight Partner To Integrate Database Monitoring Intelligence With Security Information And Event Management
Products and Releases  |  12/10/2008  | 
SecureSphere achieves certified interoperability with ArcSight SIEM Platform under the ArcSight EnterpriseView Partner Program
Palo Alto Networks Discovers Critical Vulnerability In Microsoft Word
Products and Releases  |  12/10/2008  | 
Exploited vulnerability could allow full system access and control
WhiteHat Security Releases 6th Website Security Statistics Report
Products and Releases  |  12/10/2008  | 
Report shows eight of our 10 Websites are vulnerable to attack
HP Expands Virtual Protection Tool, Desktop Linux Offering For Small Business Customers
Products and Releases  |  12/10/2008  | 
offerings are designed to help small businesses enhance their productivity and ease their management of technology
Actimize Expands IBM Partnership; Embeds Technology To Fight Fraud, Financial Crime
Products and Releases  |  12/10/2008  | 
Actimize enterprise risk platform to include IBM name matching analytics technology
SkyRecon Provides Full Disk And File-Based Encryption With StormShield Security Suite Version 5.2
Products and Releases  |  12/10/2008  | 
StormShield Security Suite Version 5.2 adds full disk encryption as a complement to its file-based encryption security layer
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file