Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2012
<<   <   Page 2 / 2
Despite Lack Of Trust, Internet Users' Security Behaviors Far From Ideal, RoboForm Study Finds
Products and Releases  |  12/12/2012  | 
Many people report experiences with having a personal online account hacked
FBI, International Law Enforcement Disrupt International Organized Cybercrime Ring Related To Butterfly Botnet
Products and Releases  |  12/12/2012  | 
Botnet linked to more than 11 million compromised computer systems and more than $850 million in losses
Most Dangerous Holiday Web Search Terms Of 2012
Products and Releases  |  12/12/2012  | 
Blue Coat's Malware Research Team recently noticed a huge spike in holiday themed Search Engine Poisoning attacks and published the results of their findings
Bond And Bourne Fuel Belief That Cyberhacking Is Easy So Why Fight It, U.K. Study Shows
Products and Releases  |  12/11/2012  | 
Adults across the U.K. are increasingly fatalistic about their level of online risk, according to a new study by YouGov plc for Kaspersky Lab
Ixia Unveils IxNetwork 7.0
Products and Releases  |  12/11/2012  | 
Update to IxNetwork gives users visibility into the performance of complex converged networks
Survey Exposes New Cloud Security Flaws
Products and Releases  |  12/11/2012  | 
SailPoint's survey found that business users have gained more autonomy to deploy cloud applications without IT involvement
Survey Of IT Professionals Reveals Discrepancy Between Support Of And Implementation Of Desktop Privilege Control
Products and Releases  |  12/11/2012  | 
Nearly half of respondents, however, report privileged accounts widespread on company desktops and laptops
Rapid7 Releases Nexpose 5.5
Products and Releases  |  12/11/2012  | 
Introduces new capabilities for configuration assessment and enhanced reporting
Chubb Cyber Endorsement Addresses Increase In Bank Account Takeover Frauds
Products and Releases  |  12/11/2012  | 
Endorsement expands the definition of fraudulent communications
Panda Security Launches Panda Cloud Antivirus 2.1 With Anti-Exploit Technologies
Products and Releases  |  12/10/2012  | 
Anti-exploit protection neutralizes malware that takes advantage of zero-day vulnerabilities in legitimate applications
Bat Blue Networks Expands Its Cloud Security Offering To Europe
Products and Releases  |  12/10/2012  | 
Adds London-based cloud node to its six data center locations in the U.S.
Biggest U.K. Brands Failing To Protect Their Customers From Online Fraud, New Research Find
Products and Releases  |  12/10/2012  | 
A mere 6 percent of home pages included some sort of site validation
Risk Management Vendor Delphiis Announces New President And CEO Chris Rogers
Products and Releases  |  12/10/2012  | 
Rogers brings more than 18 years of relevant industry experience to his new role
Awareness There, Policies Lacking: Results Of A New SANS Survey On Application Security Policies In Enterprises
Products and Releases  |  12/7/2012  | 
Survey shows organizations managing multiple applications, yet 28% can't determine what applications are under management
Damballa Failsafe 5.1 Unveils Breach Confirmation And Instant Replay Capabilities
Products and Releases  |  12/7/2012  | 
Solution combines C&C detection and malware analysis capabilities
SIA And GTSC Announce Collaboration
Products and Releases  |  12/7/2012  | 
Organizations will share resources to build a stronger security industry
Mobile Browsers Fail Georgia Tech Safety Test
Products and Releases  |  12/7/2012  | 
Cybersecurity experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to a recent Georgia Tech study
Cloud Services Providers Confident Despite Questions Around Cost Savings, Control, And Security
Products and Releases  |  12/6/2012  | 
KPMG survey finds providers see cloud revenues comprising significantly larger share of their total revenue due to migration of more sophisticated applications
Integrated Biometrics Introduces Sherlock Fingerprint Sensors
Products and Releases  |  12/6/2012  | 
Company receives FBI certification
451 Research Publishes In-Depth Security Study
Products and Releases  |  12/6/2012  | 
Security budgets experienced a significant gain between 2011 and 2012, study shows
CipherCloud Closes $30 Million Investment Round With Andreessen Horowitz
Products and Releases  |  12/5/2012  | 
CipherCloud’s existing investors include Andreessen Horowitz, Index Ventures and T-Venture
Security Industry Association Elects Three To Board Of Directors
Products and Releases  |  12/5/2012  | 
Board members elected unanimously during SIA annual member meeting
Over Half Of Chief Information Officers Fail To Test Cloud Vendors' Security Systems And Procedures
Products and Releases  |  12/5/2012  | 
Cybersecurity tops CIOs' concerns
Critical Watch Announces Interoperability With HP Enterprise Security Products As Participants In HP's Partner Program
Products and Releases  |  12/5/2012  | 
Collaboration will enhance interoperability between Critical Watch ACI Recommendation Engine and HP Fortify
Don't Bring Cybercrime Home For The Holidays
Products and Releases  |  12/5/2012  | 
Here are a few strategies for keeping the cyber-grinches out
Wave Systems Introduces Scrambls For Enterprise; Technology Protects Data Posted On Social Networks
Products and Releases  |  12/5/2012  | 
Scrambls protects data that is often overlooked in corporate security initiatives
Endgame Appoints New CEO
Products and Releases  |  12/5/2012  | 
Nathaniel Fick was most recently CEO of the Center for a New American Security (CNAS)
Mocana Rolls Out New Capabilities For Mobile App Protection (MAP)
Products and Releases  |  12/5/2012  | 
Latest release of Mocana MAP introduces a host of new app-wrapping security policies
Cloud Security: Lessons from Asgard (And Gartner's Identity And Access Management Summit)
Products and Releases  |  12/5/2012  | 
What the Tesseract can teach us about 4-dimensional cloud security threats and BYOD defenses
DDoS Mitigation Technology From Arbor Networks Now Available in Solutions for the Enterprise Ranging From 500 Mbps To 40 Gbps Mitigation Capacity
Products and Releases  |  12/5/2012  | 
Pravail APS protects enterprises that rely on Internet availability
Ricoh HotSpot Enterprise Software Simplifies, Secures Mobile Printing
Products and Releases  |  12/5/2012  | 
New product creates internal private cloud for safe, yet unfettered printing from any smartphone or tablet
FireMon Delivers Expanded Visibility Of Enterprise Network Behavior For Greater Proactive Security And Operational Effectiveness
Products and Releases  |  12/5/2012  | 
Security Manager upgrade provides more extensive visibility and insight into the behavior of traffic on the network
GuruCul Launches Security Risk Intelligence Solution For NetApp Unified Storage Systems
Products and Releases  |  12/4/2012  | 
GuruCul's Risk Analytics platform now integrated with NetApp's Unified Storage Systems as part of its core Risk Analytics platform
Prolexic Recommends Combining Two Scoring Systems For More Accurate Analysis Of DDoS Threat Levels
Products and Releases  |  12/4/2012  | 
Recommendation and a detailed how-to guide is featured in new white paper
Aveksa Releases Version 6.0 Of Its Identity And Access Management Software Platform
Products and Releases  |  12/4/2012  | 
Aveksa 6 enables enterprises to standardize on a single, centralized database for all identity and access information
Imperva Reports Antivirus Solutions Woefully Inadequate
Products and Releases  |  12/4/2012  | 
Antivirus solutions in study unable to detect newly created viruses; security investment misaligned
Majority Of Smartphone Users Would Dump Their Mobile Network Provider If Their Phone Was Hacked
Products and Releases  |  12/4/2012  | 
Crossbeam Systems' survey reveals that hacked and insecure smartphones may trigger massive churn among disgruntled customers
2012 DC3 Digital Forensics Challenge Winners
Products and Releases  |  12/4/2012  | 
U.S. earned No. 1 spot
New Android Solution Lets Users Take Active Role In Identity And App Management, IT Still Has Control
Products and Releases  |  12/4/2012  | 
SecureAuth IdP for Android is a a mobile access management solution that addresses use and security vulnerabilities due to BYOD in enterprise
PhoneFactor Announces Windows Phone App
Products and Releases  |  12/4/2012  | 
PhoneFactor App for Windows Phone extends the PhoneFactor platform
Tenable Rolls Out Vulnerabilty Management Solution For IPv6
Products and Releases  |  12/4/2012  | 
SecurityCenter Continuous View designed to identify emerging threats and vulnerabilities
80 Percent Of Attacks In 2012 Were Redirects From Legitimate Sites
Products and Releases  |  12/4/2012  | 
This and more in the new Sophos Threat Report -- outlining the changing threats and new platforms challenging IT security
Websense TRITON Architecture Stops Targeted Cyberattacks With New ACE In The Cloud Defense
Products and Releases  |  12/4/2012  | 
ACE in the Cloud is a global overlay cloud defense
Cylance Unveils Security Services Lines
Products and Releases  |  12/4/2012  | 
Presponse services predetect and solve complex security challenges
1 In 2 Who Know Employers Ban Dropbox Use It Anyway For Work
Products and Releases  |  12/3/2012  | 
Corporate leaders are the worst culprits, according to Nasuni report
Rise Of Mobile Devices, Advanced Persistent Threats And Third-Party Applications Are Top Pain Points In 2013
Products and Releases  |  12/3/2012  | 
Fourth annual State of Endpoint Risk study reports major concerns over increasing security risks
Symantec Endpoint Protection 12 Adds vShield Integration & Increases Security Effectiveness
Products and Releases  |  12/3/2012  | 
New features expand protection of virtual environments
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.