Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2012
<<   <   Page 2 / 2
Despite Lack Of Trust, Internet Users' Security Behaviors Far From Ideal, RoboForm Study Finds
Products and Releases  |  12/12/2012  | 
Many people report experiences with having a personal online account hacked
FBI, International Law Enforcement Disrupt International Organized Cybercrime Ring Related To Butterfly Botnet
Products and Releases  |  12/12/2012  | 
Botnet linked to more than 11 million compromised computer systems and more than $850 million in losses
Most Dangerous Holiday Web Search Terms Of 2012
Products and Releases  |  12/12/2012  | 
Blue Coat's Malware Research Team recently noticed a huge spike in holiday themed Search Engine Poisoning attacks and published the results of their findings
Bond And Bourne Fuel Belief That Cyberhacking Is Easy So Why Fight It, U.K. Study Shows
Products and Releases  |  12/11/2012  | 
Adults across the U.K. are increasingly fatalistic about their level of online risk, according to a new study by YouGov plc for Kaspersky Lab
Ixia Unveils IxNetwork 7.0
Products and Releases  |  12/11/2012  | 
Update to IxNetwork gives users visibility into the performance of complex converged networks
Survey Exposes New Cloud Security Flaws
Products and Releases  |  12/11/2012  | 
SailPoint's survey found that business users have gained more autonomy to deploy cloud applications without IT involvement
Survey Of IT Professionals Reveals Discrepancy Between Support Of And Implementation Of Desktop Privilege Control
Products and Releases  |  12/11/2012  | 
Nearly half of respondents, however, report privileged accounts widespread on company desktops and laptops
Rapid7 Releases Nexpose 5.5
Products and Releases  |  12/11/2012  | 
Introduces new capabilities for configuration assessment and enhanced reporting
Chubb Cyber Endorsement Addresses Increase In Bank Account Takeover Frauds
Products and Releases  |  12/11/2012  | 
Endorsement expands the definition of fraudulent communications
Panda Security Launches Panda Cloud Antivirus 2.1 With Anti-Exploit Technologies
Products and Releases  |  12/10/2012  | 
Anti-exploit protection neutralizes malware that takes advantage of zero-day vulnerabilities in legitimate applications
Bat Blue Networks Expands Its Cloud Security Offering To Europe
Products and Releases  |  12/10/2012  | 
Adds London-based cloud node to its six data center locations in the U.S.
Biggest U.K. Brands Failing To Protect Their Customers From Online Fraud, New Research Find
Products and Releases  |  12/10/2012  | 
A mere 6 percent of home pages included some sort of site validation
Risk Management Vendor Delphiis Announces New President And CEO Chris Rogers
Products and Releases  |  12/10/2012  | 
Rogers brings more than 18 years of relevant industry experience to his new role
Awareness There, Policies Lacking: Results Of A New SANS Survey On Application Security Policies In Enterprises
Products and Releases  |  12/7/2012  | 
Survey shows organizations managing multiple applications, yet 28% can't determine what applications are under management
Damballa Failsafe 5.1 Unveils Breach Confirmation And Instant Replay Capabilities
Products and Releases  |  12/7/2012  | 
Solution combines C&C detection and malware analysis capabilities
SIA And GTSC Announce Collaboration
Products and Releases  |  12/7/2012  | 
Organizations will share resources to build a stronger security industry
Mobile Browsers Fail Georgia Tech Safety Test
Products and Releases  |  12/7/2012  | 
Cybersecurity experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to a recent Georgia Tech study
Cloud Services Providers Confident Despite Questions Around Cost Savings, Control, And Security
Products and Releases  |  12/6/2012  | 
KPMG survey finds providers see cloud revenues comprising significantly larger share of their total revenue due to migration of more sophisticated applications
Integrated Biometrics Introduces Sherlock Fingerprint Sensors
Products and Releases  |  12/6/2012  | 
Company receives FBI certification
451 Research Publishes In-Depth Security Study
Products and Releases  |  12/6/2012  | 
Security budgets experienced a significant gain between 2011 and 2012, study shows
CipherCloud Closes $30 Million Investment Round With Andreessen Horowitz
Products and Releases  |  12/5/2012  | 
CipherCloud’s existing investors include Andreessen Horowitz, Index Ventures and T-Venture
Security Industry Association Elects Three To Board Of Directors
Products and Releases  |  12/5/2012  | 
Board members elected unanimously during SIA annual member meeting
Over Half Of Chief Information Officers Fail To Test Cloud Vendors' Security Systems And Procedures
Products and Releases  |  12/5/2012  | 
Cybersecurity tops CIOs' concerns
Critical Watch Announces Interoperability With HP Enterprise Security Products As Participants In HP's Partner Program
Products and Releases  |  12/5/2012  | 
Collaboration will enhance interoperability between Critical Watch ACI Recommendation Engine and HP Fortify
Don't Bring Cybercrime Home For The Holidays
Products and Releases  |  12/5/2012  | 
Here are a few strategies for keeping the cyber-grinches out
Wave Systems Introduces Scrambls For Enterprise; Technology Protects Data Posted On Social Networks
Products and Releases  |  12/5/2012  | 
Scrambls protects data that is often overlooked in corporate security initiatives
Endgame Appoints New CEO
Products and Releases  |  12/5/2012  | 
Nathaniel Fick was most recently CEO of the Center for a New American Security (CNAS)
Mocana Rolls Out New Capabilities For Mobile App Protection (MAP)
Products and Releases  |  12/5/2012  | 
Latest release of Mocana MAP introduces a host of new app-wrapping security policies
Cloud Security: Lessons from Asgard (And Gartner's Identity And Access Management Summit)
Products and Releases  |  12/5/2012  | 
What the Tesseract can teach us about 4-dimensional cloud security threats and BYOD defenses
DDoS Mitigation Technology From Arbor Networks Now Available in Solutions for the Enterprise Ranging From 500 Mbps To 40 Gbps Mitigation Capacity
Products and Releases  |  12/5/2012  | 
Pravail APS protects enterprises that rely on Internet availability
Ricoh HotSpot Enterprise Software Simplifies, Secures Mobile Printing
Products and Releases  |  12/5/2012  | 
New product creates internal private cloud for safe, yet unfettered printing from any smartphone or tablet
FireMon Delivers Expanded Visibility Of Enterprise Network Behavior For Greater Proactive Security And Operational Effectiveness
Products and Releases  |  12/5/2012  | 
Security Manager upgrade provides more extensive visibility and insight into the behavior of traffic on the network
GuruCul Launches Security Risk Intelligence Solution For NetApp Unified Storage Systems
Products and Releases  |  12/4/2012  | 
GuruCul's Risk Analytics platform now integrated with NetApp's Unified Storage Systems as part of its core Risk Analytics platform
Prolexic Recommends Combining Two Scoring Systems For More Accurate Analysis Of DDoS Threat Levels
Products and Releases  |  12/4/2012  | 
Recommendation and a detailed how-to guide is featured in new white paper
Aveksa Releases Version 6.0 Of Its Identity And Access Management Software Platform
Products and Releases  |  12/4/2012  | 
Aveksa 6 enables enterprises to standardize on a single, centralized database for all identity and access information
Imperva Reports Antivirus Solutions Woefully Inadequate
Products and Releases  |  12/4/2012  | 
Antivirus solutions in study unable to detect newly created viruses; security investment misaligned
Majority Of Smartphone Users Would Dump Their Mobile Network Provider If Their Phone Was Hacked
Products and Releases  |  12/4/2012  | 
Crossbeam Systems' survey reveals that hacked and insecure smartphones may trigger massive churn among disgruntled customers
2012 DC3 Digital Forensics Challenge Winners
Products and Releases  |  12/4/2012  | 
U.S. earned No. 1 spot
New Android Solution Lets Users Take Active Role In Identity And App Management, IT Still Has Control
Products and Releases  |  12/4/2012  | 
SecureAuth IdP for Android is a a mobile access management solution that addresses use and security vulnerabilities due to BYOD in enterprise
PhoneFactor Announces Windows Phone App
Products and Releases  |  12/4/2012  | 
PhoneFactor App for Windows Phone extends the PhoneFactor platform
Tenable Rolls Out Vulnerabilty Management Solution For IPv6
Products and Releases  |  12/4/2012  | 
SecurityCenter Continuous View designed to identify emerging threats and vulnerabilities
80 Percent Of Attacks In 2012 Were Redirects From Legitimate Sites
Products and Releases  |  12/4/2012  | 
This and more in the new Sophos Threat Report -- outlining the changing threats and new platforms challenging IT security
Websense TRITON Architecture Stops Targeted Cyberattacks With New ACE In The Cloud Defense
Products and Releases  |  12/4/2012  | 
ACE in the Cloud is a global overlay cloud defense
Cylance Unveils Security Services Lines
Products and Releases  |  12/4/2012  | 
Presponse services predetect and solve complex security challenges
1 In 2 Who Know Employers Ban Dropbox Use It Anyway For Work
Products and Releases  |  12/3/2012  | 
Corporate leaders are the worst culprits, according to Nasuni report
Rise Of Mobile Devices, Advanced Persistent Threats And Third-Party Applications Are Top Pain Points In 2013
Products and Releases  |  12/3/2012  | 
Fourth annual State of Endpoint Risk study reports major concerns over increasing security risks
Symantec Endpoint Protection 12 Adds vShield Integration & Increases Security Effectiveness
Products and Releases  |  12/3/2012  | 
New features expand protection of virtual environments
<<   <   Page 2 / 2


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
CVE-2011-1930
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
CVE-2011-1145
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
CVE-2011-1488
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...