Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2008
Page 1 / 3   >   >>
PC Tools: Top Internet Blunders of '08
Products and Releases  |  12/29/2008  | 
A look at the top Internet security blunders during the past year
ESET Teams With Inquira
Products and Releases  |  12/29/2008  | 
Antivirus vendor expects to raise the bar in customer service for the IT Security Industry
Webroot Threat Advisory: Hackers Using Continental Flight 1404 Headlines To Scam Online News-Seekers
Products and Releases  |  12/23/2008  | 
Rogue apps trick users into purchasing phony software and sharing personal information
Comodo Releases EasyVPN Beta
Products and Releases  |  12/23/2008  | 
Comodo EasyVPN beta uses IM clients to access files, PCs
IronKey's New Anti-Worm Malware Protection Battles AutoRun Worms
Products and Releases  |  12/22/2008  | 
Patent-pending technology prevents USB AutoRun worms from infecting corporate and government networks
IT Confidence Drops To Lowest Level In 2008
Products and Releases  |  12/22/2008  | 
More staffing and budget cuts are anticipated in 2009, according to the latest CDW IT Monitor
Prism Microsystems Adds Smart Search To Security Information and Event Management Solution
Products and Releases  |  12/19/2008  | 
Solution combines intelligent analytics to extract meaning from raw logs with free-form intuitive search to extract precise matches from terabyte of data
Cyber Secure Institute Cuts Through Misleading Security Claims: LynuxWorks and LynxSecure
Products and Releases  |  12/19/2008  | 
What LynuxWorks actually said is its system supports EAL 7 evaluation or could be evaluated at that level, says The Cyber Secure Institute
Secerno Makes Enterprise-Class Database Security Available To Branch Offices And SMEs
Products and Releases  |  12/19/2008  | 
Release of Secerno DataWall 3.2 includes two new entry-level versions of Secerno's active database control solution
SECNAP Adds Advanced Reporting Functionality To SpammerTrap Email Security Reporting Package
Products and Releases  |  12/19/2008  | 
Security Gateway provides a robust array of reports for client administrators, as well as several enhanced reports for end users
IronKey Announces New Capabilities To Remotely Protect Secure USB Flash Drives
Products and Releases  |  12/19/2008  | 
IronKey's Trusted Network allows IT administrators to remotely restrict IronKey devices from being used on systems outside specified enterprise IP addressees
Avocado Security Launches Enterprise Edition 2.0 Security & Business Intelligence Optimization Platform
Products and Releases  |  12/19/2008  | 
Solution automates discovery and detection, and analyzes billions of CCTV video surveillance security images
Zero-Day Web Malware Blocks Surpass Yearly Average
Products and Releases  |  12/18/2008  | 
Leading provider of SaaS Web security reports zero-day malware accounted for 26% of blocks in November
Sourcefire Announces EMEA Channel Expansion
Products and Releases  |  12/18/2008  | 
Sourcefire appoints six new strategic partners across EMEA
Nuclear Regulatory Commission Expands Cybersecurity Requirements For Nuke Power Plants
Products and Releases  |  12/18/2008  | 
New rule adds several new requirements as a result of experience in implementing previous security orders and updates the regulatory framework in preparation for the licensing of new nuclear power plants
John Wyatt Named President And CEO Of Cigital
Products and Releases  |  12/18/2008  | 
Wyatt, who has been running Cigital since 2005 as the company's COO, will continue to be responsible for the company's overall management and business strategy
Network Frontiers Releases Media Disposal Toolkit
Products and Releases  |  12/18/2008  | 
Network Frontiers' Media Disposal Toolkit contains everything any organization needs to know about data disposal, presented in a logical actionable format
Sourcefire 3D System 4.8 Now Available On Crossbeam Security Platform
Products and Releases  |  12/17/2008  | 
System provides adaptive intrusion prevention capabilities to secure large enterprise network assets against all forms of security threats
Logica Implements SSH Tectia For Securing City of Helsinki's Financial Apps
Products and Releases  |  12/17/2008  | 
Implementation involves more than 1,300 workstations and application servers to secure file transfers and data connections between workstations and application servers for the City of Helsinki
Beth Israel Medical Center Adds Third Brigade's Server Security
Products and Releases  |  12/17/2008  | 
BIDMC is using the host-based firewall module of Third Brigade Deep Security to create zones of trust within its datacenters
ConSentry Enhances Partner Program
Products and Releases  |  12/17/2008  | 
Announcement includes a series of programs, pricing changes, and tools aimed at broadening opportunities for its networking channel
Fidelis's XPS DLP Solution Adds Passive Data Discovery
Products and Releases  |  12/17/2008  | 
New system version enhances an enterprise's ability to reduce the risks of leakage of protected or sensitive information
SecureMac Releases DNSChanger Trojan Removal Tool 2.0
Products and Releases  |  12/17/2008  | 
Free tool detects and removes new variants discovered since the original tool was released
Palamida Finds Security Tops List Of Concerns Inhibiting Broader Open Source Adoption
Products and Releases  |  12/17/2008  | 
Company highlights 25 open source projects that organizations can use with confidence
GlobalCrypto's RealMe Available As A Flash Web Widget
Products and Releases  |  12/17/2008  | 
RealMe strong authentication software enables a user to upload a photo of their choice and have that picture embedded with cryptographic information unique to the user and Web site
PGP Whole Disk Encryption Approved For Use Within U.K. Goverment
Products and Releases  |  12/16/2008  | 
Baseline approval provides assurance against data loss from laptops and desktops
Canada's NB Power Chooses Waterfall Security Solutions For Network Security
Products and Releases  |  12/16/2008  | 
Waterfall's patent pending solutions enables network segregation ("air gapping") and provide absolute and impenetrable security for critical networks
Rapid7 Launches New 'PartnerFirst' Program
Products and Releases  |  12/16/2008  | 
Program will help partners meet demand for Rapid7 NeXpose vulnerability management for security and compliance
WorkLight And Netvibes Develop New Secure Widget Platform
Products and Releases  |  12/16/2008  | 
Companies taking advantage of these new capabilities can provide consumers with a host of customized tools, ranging from secure RSS feeds and targeted promotional widgets to secure, transactional widgets for managing accounts
Veracode Appoints Jon Stevenson SVP Of Technology And Service Operations
Products and Releases  |  12/16/2008  | 
Stevenson, who held senior management roles at companies such as BMC and HP, is responsible for all aspects of engineering, product management, security research and service delivery
Q1 Labs Unveils Network Security Management Solution For Virtual Environments
Products and Releases  |  12/16/2008  | 
VFlow Collector helps IT pros gain network and application layer visibility into their virtual worlds
Investment Bank Upgrades Global Infrastructure With Palo Alto Networks Firewalls
Products and Releases  |  12/16/2008  | 
Greenhill & Co. adds user-based visibility and policy control of Webmail to reduce risk of regulatory noncompliance
Finjan Creates Advisory Board
Products and Releases  |  12/16/2008  | 
First two members are Gregory Todd Garcia, the first presidentially appointed Assistant Secretary for Cyber Security and Communications at the DHS, and Taher Elgamal, a leading expert in computer, network and information security
Cloudmark Survey: Operators Ignore Mobile Spam
Products and Releases  |  12/15/2008  | 
New research finds that operators anticipate increased mobile spam attacks, but are slow to protect against them
Open Letter From SESTA Calls For Tighter USB Security
Products and Releases  |  12/15/2008  | 
SanDisk Enterprise Solutions Technology Alliance calls on IT professionals to implement improved security for USB storage devices without hampering worker productivity or banning the use of these powerful devices
Core Impact Pro V8 Extends Automated Web App Penetration Testing
Products and Releases  |  12/15/2008  | 
The newest version of Core Security Technologies' flagship security testing software builds on the its range of comprehensive network, endpoint and Web application testing capabilities
LogRhythm Adds Intelligent IT Search To Log Management System
Products and Releases  |  12/15/2008  | 
LogRhythm enhances cryptic raw logs to yield meaning, trends, and anomalies from search results
Business Services For U.S. Immigrants At Extremely High Risk Of Cybercriminal Penetration
Products and Releases  |  12/12/2008  | 
Panda Security assessment finds businesses primarily used by U.S. immigrants to send money back to their home countries to be severely lacking in security measures
Panda Security Reveals Major Security Flaws In Money Transfer Businesses
Products and Releases  |  12/12/2008  | 
Lack of security could allow cybercrooks to obtain users' bank details and empty their accounts
West Coast Labs Completes Anti-Malware Testing, Issues Checkmark Anti-Malware Certification
Products and Releases  |  12/11/2008  | 
17 companies subjected their products to extensive testing to defend against malware attacks authored worldwide; US continues as lead originator of malware attacks against US companies and organizations
Flurry Of Spam Targeting The Federal Bureau Of Investigation
Products and Releases  |  12/11/2008  | 
Consumers continue to be inundated by spam purportedly from the FBI
Monext Chooses Verizon Business Security Solutions to Support Delivery Of Industry-Compliant Bank-Payment Services
Products and Releases  |  12/11/2008  | 
Verizon Business' professional services will enable certification of Monext's processing system
Bit9 Identifies 'The Dirty Dozen' - 2008's Most Popular Applications With Critical Security Vulnerabilities
Products and Releases  |  12/11/2008  | 
Reputable programs found vulnerable; security gaps often left unaddressed
How Companies Can Use IT Security To Protect Against Insider Attacks
Products and Releases  |  12/11/2008  | 
Tough economic times present increased motivation for cybercrime. Experts from Gotham Digital Science share tactics that companies can use to protect against security attacks executed by disgruntled or former employees
Imperva, ArcSight Partner To Integrate Database Monitoring Intelligence With Security Information And Event Management
Products and Releases  |  12/10/2008  | 
SecureSphere achieves certified interoperability with ArcSight SIEM Platform under the ArcSight EnterpriseView Partner Program
Palo Alto Networks Discovers Critical Vulnerability In Microsoft Word
Products and Releases  |  12/10/2008  | 
Exploited vulnerability could allow full system access and control
WhiteHat Security Releases 6th Website Security Statistics Report
Products and Releases  |  12/10/2008  | 
Report shows eight of our 10 Websites are vulnerable to attack
HP Expands Virtual Protection Tool, Desktop Linux Offering For Small Business Customers
Products and Releases  |  12/10/2008  | 
offerings are designed to help small businesses enhance their productivity and ease their management of technology
Actimize Expands IBM Partnership; Embeds Technology To Fight Fraud, Financial Crime
Products and Releases  |  12/10/2008  | 
Actimize enterprise risk platform to include IBM name matching analytics technology
SkyRecon Provides Full Disk And File-Based Encryption With StormShield Security Suite Version 5.2
Products and Releases  |  12/10/2008  | 
StormShield Security Suite Version 5.2 adds full disk encryption as a complement to its file-based encryption security layer
Page 1 / 3   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25288
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
CVE-2020-25781
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
CVE-2020-25830
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
CVE-2020-26159
PUBLISHED: 2020-09-30
In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .
CVE-2020-6654
PUBLISHED: 2020-09-30
A DLL Hijacking vulnerability in Eaton's 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.