Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2010
<<   <   Page 2 / 2
Dataguise Offers Free One-Day Risk Assessment Service To Identify Unprotected Sensitive Data Across Databases
Products and Releases  |  12/9/2010  | 
R.A.P.I.D. Service uses Dataguise DgDiscoverT, an automated database security solution
Agiliance Puts Cloud Security Alliance GRC Stack In RiskVision
Products and Releases  |  12/9/2010  | 
Customers can monitor compliance in the cloud against specific frameworks and regulations
Zenprise Rolls Out New Mobile Security Technology
Products and Releases  |  12/9/2010  | 
MobileManager version 6.0 dynamically protects applications and data anywhere in the mobile environment
Nominum Announces Dashboard To Analyze Network Data
Products and Releases  |  12/8/2010  | 
iView is a hosted service with a browser-based graphical interface
Fidelis Adds Botnet Visibility And Control To Enterprise Security Software
Products and Releases  |  12/8/2010  | 
Fidelis XPS provides an Anti-Botnet threat intelligence feed powered by Umbra Data
House Passes Bill To Provide Important Fix For Security Industry
Products and Releases  |  12/8/2010  | 
Proposal advocated by SIA-led coalition would undo nonsensical energy requirement
Core Security Rolls Out Core Impact Pro Version 11
Products and Releases  |  12/8/2010  | 
With IMPACT Pro v11 penetration testing software, organizations can now assess their exposure to attacks carried out against network devices
GFI Software Discovers Amazon Receipt Generator Scam
Products and Releases  |  12/8/2010  | 
Web program creates fake receipts, targeting retailers during the height of holiday shopping season
ComplyGuard Networks Introduces ComplyShield 4.0T
Products and Releases  |  12/8/2010  | 
ComplyShield 4.0 provides a new interface and a new vulnerability dashboard
Secunia Debuts Security Factsheets
Products and Releases  |  12/7/2010  | 
Factsheets outline the development in advisories and vulnerabilities for a specific application, system, or plug-in
eEye Rolls Out Centralized End-To-End Vulnerability, Compliance Product
Products and Releases  |  12/7/2010  | 
Retina CS 2.0 Management Console provides centralized vulnerability management across enterprises of any size
Anonymous Cyber-Activist Group Launches New Attacks In Defense Of WikiLeaks Founder
Products and Releases  |  12/7/2010  | 
So far PandaLabs has detected three attacks
Symantec: Cybercriminals Diversified Attack Tactics To Sustain High Levels Of Spam, Malware In 2010
Products and Releases  |  12/7/2010  | 
Botnets prove resilient another year on; email-borne malware increases 100-fold
MasterCard Worldwide Launches Next Generation Fraud Prevention Solutions
Products and Releases  |  12/7/2010  | 
Services represent the latest addition to MasterCard's suite of Expert Monitoring Solutions
Entrust's Fraud Detection, Strong Authentication Platforms Double In Sales This Year
Products and Releases  |  12/6/2010  | 
Credentialing, mobility, fraud detection, and authentication solutions underpin momentum
Ground Labs, Stickman Consulting Partner To Enable PCI Compliance Throughout Asia Pacific
Products and Releases  |  12/6/2010  | 
Stickman Consulting will leverage partnership to offer Ground Labs' PCI compliance products
AmIHackerProof.com 2.0 Takes Vulnerability Scan Testing To Another Level
Products and Releases  |  12/6/2010  | 
Online security audit service detects vulnerabilities on a person's computer or network
Emerging Threats, NitroSecurity Form Technology Partnership To Share Threat Intelligence
Products and Releases  |  12/6/2010  | 
Companies will share research and combine rulesets
Imperva Unveils Comprehensive Strategy To Enhance Data Security In The Cloud
Products and Releases  |  12/6/2010  | 
Additionally, Imperva spin-off Incapsula will help Web hosters give SMBs affordable Web application protection
ESG Study: 2/3 Of Critical Infrastructure Orgs Suffer Cyber Breaches
Products and Releases  |  12/3/2010  | 
Research focused specifically on cyber supply-chain policies, processes, and technical safeguards
AMTSO Publishes Guidelines For False Positive Testing
Products and Releases  |  12/3/2010  | 
Anti-Malware Testing Standards Organization make guidelines available for free download
Barracuda Launches SaaS Email Service
Products and Releases  |  12/2/2010  | 
Barracuda Email Security Service can be leveraged as a cloud protection layer for the Barracuda Spam & Virus Firewall
New Hacker Campaign Targets Holiday Trending Topics On Twitter To Spread Malware, According To PandaLabs
Products and Releases  |  12/2/2010  | 
Hackers are capitalizing on holiday-themed words and phrases to direct users to malicious websites
Novell Reports Financial Results For Fourth Fiscal Quarter And Full Fiscal Year 2010
Products and Releases  |  12/2/2010  | 
Novell reported Q4 net revenue of $207 million
Palo Alto Networks CEO Resigns, Search Begins For Replacement
Products and Releases  |  12/2/2010  | 
Differences in leadership philosophy leads to Lane Bess' resignation
eIQnetworks Unveils Real-Time Forensic Search Engine For Security and Compliance Data
Products and Releases  |  12/1/2010  | 
ForensicVue extends the existing forensic capabilities of eIQnetworks' unified situational awareness platform
Eyeball Releases Firewall And NAT Traversal Solution For iPhone
Products and Releases  |  12/1/2010  | 
AnyFirewall Engine designed for the iOS operating system
PacketMotion Delivers Tool For New Zero Trust Model Of Information Security
Products and Releases  |  12/1/2010  | 
PacketSentry is designed for protection and audit of the internal network
DOJ: Former University Students Indicted For Hacking At Their School
Products and Releases  |  12/1/2010  | 
Pair gained unlawful and unauthorized access to the University of Central Missouri computer network
AlphaSSL To Launch Enhanced SSL Features And Reduced Pricing
Products and Releases  |  12/1/2010  | 
Enhanced certificate offering includes moving to an unlimited server licensing model
CA Identity Manager Now Available on Salesforce.com AppExchange 2, Marketplace For Business Apps
Products and Releases  |  12/1/2010  | 
CA Identity Manager on AppExchange 2 automates identity management functions
WatchGuard Upgrades Messaging Security Appliance
Products and Releases  |  12/1/2010  | 
WatchGuard XCS 770R aimed at midmarket and enterprise environments
IBM And American Well Team To Enhance Security For Online Health Data
Products and Releases  |  12/1/2010  | 
Partnership to further embed security into American Well's Online Care system
Softonic.com Offers Secure Free Software Download Site
Products and Releases  |  12/1/2010  | 
Launches new security seal that scans programs before they are downloaded to ensure they are not infected with a virus
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.