Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2009
Page 1 / 2   >   >>
Centrify Awarded Patent In Identity Management Of Unix, Linux Systems
Products and Releases  |  12/30/2009  | 
Patented technology facilitates service accounts and root accounts to be authenticated within a centralized directory
VeriSign Metrics Highlight Significantly Heavier Traffic This Holiday Season
Products and Releases  |  12/30/2009  | 
On three of the busiest online holiday shopping days, VeriSign seal was viewed roughly 50 percent more than same days last year
Fortinet Announces Breakthrough In IPv6 Security Throughput
Products and Releases  |  12/29/2009  | 
BreakingPoint Elite used to validate IPv6 performance on FortiGate-5140 multi-threat system
E-Threats Shifting With International Current Events, Rising Popularity Of Web 2.0, Study Says
Products and Releases  |  12/28/2009  | 
Cybercriminals continue to find creative means of distribution in the second half of 2009, says BitDefender
Two Consumer Groups Ask FTC To Block Google's Purchase Of AdMob
Products and Releases  |  12/28/2009  | 
$750 million deal is anticompetitive and raises privacy concerns, they say
OTA Asks FTC For Standardized Privacy And More Browser Controls
Products and Releases  |  12/23/2009  | 
OTA recommends a three-fold approach
Palisade PacketSure Certified For Twitter And Facebook
Products and Releases  |  12/22/2009  | 
Company completes internal certification of its PacketSure 7.6 service
BreakingPoint Introduces Bing-like Security Strike Search Engine
Products and Releases  |  12/21/2009  | 
Search engine helps users find and select security vulnerabilities
Element Payment Services, Trustwave Partner In Level 4 PCI Compliance Program
Products and Releases  |  12/21/2009  | 
Element merchants will have access to TrustKeeper 3.0 Web portal
SIA Launching Field Studies For Physical Security, Security Project Management
Products and Releases  |  12/21/2009  | 
Security Industry Association seeks participation from security professionals
Astaro Releases Version 2.1 Of Free Astaro Command Center
Products and Releases  |  12/21/2009  | 
Central management product is available as software and virtual appliances
SmoothWall Launches Powerful Web Filtering Appliance
Products and Releases  |  12/21/2009  | 
SWG-1200 the most powerful addition to 'Guardian' filtering family
Webroot, AnchorFree Join Forces
Products and Releases  |  12/21/2009  | 
Companies team to deliver a new consumer security and privacy offering to Hotspot Shield's 7.5 million users
Clavister Adds Enhancements To Clavister Security Gateway 4300 Series
Products and Releases  |  12/21/2009  | 
UTM security solution will now ship with an optional redundant Power Supply Unit and Redundant Fan Module
Discretix Announces Embedded Security Solutions For Media Phones
Products and Releases  |  12/21/2009  | 
CryptoCell enables software updates, data storage, and debugging
IETF, BITS Financial Services And MAAWG Join Forces
Products and Releases  |  12/17/2009  | 
New liaisons will help expedite the adoption of MAAWG best practices
Cryptzone Acquires AppGate Network Security AB
Products and Releases  |  12/17/2009  | 
Companies both offer DLP products, but from different angles
Report: Over 97% Of November Email Was Spam
Products and Releases  |  12/17/2009  | 
Casino- and pharmaceutical-related spam remain at top, according to eleven
Zscaler Protects Against Adobe Acrobat Reader Zero-Day Exploits
Products and Releases  |  12/17/2009  | 
Deploys protection from unpatched Adobe Acrobat Reader vulnerability
Symantec, Message Systems Join Forces
Products and Releases  |  12/17/2009  | 
Service Provider Next Gen Initiative to develop security and messaging solutions for communication service providers
'Five Golden Rules' For Reducing Security Risk Posed By Temporary Holiday Workers
Products and Releases  |  12/17/2009  | 
Courion provides best-practices approach to prevent security breaches
Veracode Hits Milestone Of 50B Lines Of Code Scanned
Products and Releases  |  12/17/2009  | 
Also announces free application risk assessment to Fortify customers
Secure64 Releases High-Performing DNS Caching Software
Products and Releases  |  12/17/2009  | 
Secure64 DNS Cache protects against cache poisoning attacks
MSSPs Team Up For Global Offering
Products and Releases  |  12/17/2009  | 
Companies will provide customers with common security monitoring, management and compliance services
Black Box Rolls Out New NAC
Products and Releases  |  12/17/2009  | 
Veri-NAC only lets authorized computers and devices onto a defined network
Protegrity Advances Tokenization Of Sensitive Data With Transparent, On-Site Enterprise-Ready Solution
Products and Releases  |  12/17/2009  | 
DPS 5.1 provides strong protection for payment card data, personally identifiable information, and other sensitive data
WatchGuard Unveils Enhanced Managed Security Services Program
Products and Releases  |  12/16/2009  | 
Program includes remote management security features integrated into WatchGuard's new Fireware XTM-based security appliances
Shavlik, Numara Partner on Patch Management
Products and Releases  |  12/16/2009  | 
Numara Patch Manager determines security gaps in IT security environments
BlockMaster Launches SafeConsole 4.0 To Enhance Usability And Security Of USB Devices
Products and Releases  |  12/16/2009  | 
Software designed to provide better usability for employees and more control for administrators
Black Hat Announces Abu Dhabi 2010
Products and Releases  |  12/16/2009  | 
Event will host top-tier public and private sector security professionals from the Middle-East region
SAP, Security Weaver Settle Lawsuit
Products and Releases  |  12/16/2009  | 
Additionally, Security Weaver has entered into a new certification agreement with SAP
CIS Names Board Chairman
Products and Releases  |  12/16/2009  | 
John Gilligan brings extensive operational security experience in both public and private sectors
Neustar Implements DNS Security Extensions In The .US Registry
Products and Releases  |  12/16/2009  | 
Technology uses public key cryptography and digital signatures
Optenet Offers New SaaS Security Solution For The Enterprise
Products and Releases  |  12/16/2009  | 
OSE Advanced Edition consists of four key solutions
EMC Upgrades Data Protection Management Analysis And Reporting
Products and Releases  |  12/16/2009  | 
Adds replication support in its EMC Data Protection Advisor software
PhishMe Reaches Milestone
Products and Releases  |  12/16/2009  | 
Intrepidus Group' employee education awareness solution surpasses 750K mark
FishNet Rolls Out SIEM Service
Products and Releases  |  12/16/2009  | 
Managed security service supports leading SIEM solutions from either RSA and Q1 Labs
PKWARE, Fidelis Security Systems Release Joint Content-Aware Encryption Solution
Products and Releases  |  12/15/2009  | 
Solution enables companies to set centralized policy management controls for automatic detection and encryption of sensitive information
Deloitte: 'Tis The Season For Cyber Vigilance
Products and Releases  |  12/15/2009  | 
Deloitte offers the following action steps consumers can take to increase their security profile
ActivIdentity To Acquire CoreStreet
Products and Releases  |  12/15/2009  | 
ActivIdentity believes the acquisition will strengthen its strong authentication and credential management product portfolio
EMC Unveils New Version Of EMC Data Protection Advisor
Products and Releases  |  12/14/2009  | 
Adds replication suuport
Lieberman Software Provides Privileged Identity Management Solution For Microsoft Office SharePoint Server
Products and Releases  |  12/14/2009  | 
Enterprise Random Password Manager integrates with all current and recent versions of SharePoint Server
Iovation Partners With Litle & Co. In Secure Payment Solutions
Products and Releases  |  12/11/2009  | 
iovation ReputationManager IDs computers bad guys are using to steal from online businesses and blocks fraudulent transaction attempts
Kace Upgrades Endpoint Security Product
Products and Releases  |  12/11/2009  | 
Includes patching as a base component of its appliance PC life cycle management offering
Solera Networks Launches OS 4.0
Products and Releases  |  12/11/2009  | 
Solera OS 4.0 provides active network forensics solutions
BitDefender Partners With S.N. Safe&Software
Products and Releases  |  12/11/2009  | 
S.N. Safe&Software to use BitDefender's antivirus engine to power its product line
Check Point: Adds Full Disk Encryption For Apple's Macintosh OS X Snow Leopard Platform
Products and Releases  |  12/11/2009  | 
Check Point Full Disk Encryption simplifies deployment and management of endpoint security by automatically encrypting all hard drive contents
MessageLabs '09 Report: Botnets Bounce Back With Sharpened Survival Skills
Products and Releases  |  12/11/2009  | 
The bad guys sharpened their skills, rather than just relying on large spam runs and malware attacks
CA Report: Fake Security Software, Search Engines, Social Networks 2009's Top Internet Threats
Products and Releases  |  12/11/2009  | 
CA security researchers also offer predictions for the top Internet threats for 2010
Free DNS Service From Comodo
Products and Releases  |  12/10/2009  | 
Service offers three safeguards against Domain Name Server data corruption
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.