Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2013
Page 1 / 2   >   >>
GOTrust Introduces FIDO microSD
Products and Releases  |  12/24/2013  | 
Provides universal strong authentication that can replace password authentication
Made In IBM Labs: Advancing Privacy And Security In The Cloud
Products and Releases  |  12/23/2013  | 
Patented cryptography invention enables unlimited analysis of encrypted data
FireEye Releases 2013 Lab Performance Stats
Products and Releases  |  12/23/2013  | 
Among the findings: discovery of 11 zero-day threats
AT&T Helps Businesses Improve Mobile Transaction Security With New Mobile Identity API Toolkit
Products and Releases  |  12/23/2013  | 
Toolkit allows businesses to automate fraud avoidance queries
Silent Circle Announces Silent Contacts 1.0 App For Android
Products and Releases  |  12/23/2013  | 
App gives Silent Phone and Silent Text users an encrypted address book and full control of their call logs and contacts
Credit Unions: Target's Credit Card Breach Will Cost Consumers, Financial Industry
Products and Releases  |  12/23/2013  | 
Each card costs credit unions $5 to $10 to reissue and deliver
BlackBerry Announces BBM Regulated For BlackBerry 10 Enterprise Customers
Products and Releases  |  12/23/2013  | 
By managing BBM through BES, IT managers can log, archive, and audit BBM conversations and meet compliance requirements
Intel Capital Invests In AlienVault, Closes $30M Series D
Products and Releases  |  12/23/2013  | 
With the Series D funding, AlienVault will continue to scale the company’s global sales and marketing programs
Encrypted Cloud Startup Tresorit Reveals Pricing, Challenges Hackers To Break Their Service For $25,000
Products and Releases  |  12/19/2013  | 
Tresorit is built on patented cryptographic tech, and uses shareable client-side encryption
SANS' Tenth Annual Holiday Hacking Challenge Is Now Live!
Products and Releases  |  12/18/2013  | 
Annual year-end tradition helps teach in-demand cybersecurity skills for defending computers and networks
Akamai Ups The Ante For Optimized Web Performance And Control
Products and Releases  |  12/18/2013  | 
Unveils several enhancements to the company's flagship web experience solutions
90-Day Spam Campaign Turns To Santa In December
Products and Releases  |  12/18/2013  | 
Holidays are often used by cybercriminals to rejuvenate and lengthen otherwise ordinary spam campaigns, says Commtouch
FireMon Teams With Key Federal Partners to Deliver Cybersecurity Solutions Powering New Continuous Monitoring Programs
Products and Releases  |  12/18/2013  | 
Announces partnerships with immixGroup, MicroTech, and SRA
Nominum Launches Tool To Minimize Effect Of DNS-Based DDoS Attacks
Products and Releases  |  12/18/2013  | 
Vantio CacheServe 5.4 introduces precision policies to rate limit DNS traffic based on specific criteria
Blue Coat Acquires Norman Shark
Products and Releases  |  12/18/2013  | 
Acquisition unites zero-day sandboxing technology with advanced threat protection
(ISC)2 Delivers Recommendations For Solving The U.S. Government Cyber Security Skills Gap Challenge
Products and Releases  |  12/17/2013  | 
CISO-level executives from federal agencies and departments met in an effort to gain greater understanding of the underlying challenge facing the federal environment
Datacard Announces Agreement To Acquire Entrust
Products and Releases  |  12/17/2013  | 
Company will accelerate investments in personalization, identity, and credentialing solutions
Panda Boosts Security & Control With IOS & Android MDM
Products and Releases  |  12/16/2013  | 
Solution allows management of laptops, smartphones, and tablets
IBM Labs: Patented Invention Prevents Devices From Running Compromised Software Code
Products and Releases  |  12/16/2013  | 
Invention provides security controls that restrict and prevent access to apps unless their original, previously encrypted code remains unchanged and uncompromised
Invincea Raises $16 Million In C-Series Funding Led By Aeris Capital And Dell Ventures
Products and Releases  |  12/16/2013  | 
Additionally, the company announced it acquired Sandboxie in an earlier 2013 transaction
Easy Solutions Mobile Launched
Products and Releases  |  12/13/2013  | 
Offering allows banks to natively embed application malware protection, advanced strong authentication, and mobile endpoint security into their banking applications
Christmas Warning: Kaspersky Lab Finds Gamers Attacked 11.7 Million Times In 2013
Products and Releases  |  12/13/2013  | 
On average, users in Europe were hit by 34,000 attacks related to gaming malware daily
Ponemon Institute Reveals Results Of First Cybersecurity Salary Benchmarking Survey
Products and Releases  |  12/13/2013  | 
Survey reveals higher average salaries than expected
Norse Expands Threat Intelligence To Include Detection Of Malware In Development And Identification Of Devices
Products and Releases  |  12/12/2013  | 
Norse IPViking 2.0 has can identify mobile and desktop devices, appliances, servers, and even satellites in space attempting to connect to networks via malicious IP addresses
Lack Of Planning and Visibility Increases Attack Chaos And Impact Of DDoS Attacks
Products and Releases  |  12/12/2013  | 
Corero survey asked respondents about the effectiveness of their plans to prevent, detect, and mitigate damage of a cyberattack
iboss Launches Threat And Event Console
Products and Releases  |  12/12/2013  | 
Solution provides visual insight into possible cyberthreats, mobile device malware breaches, and network attacks from social media sites
SecureAuth Launches 2Factor As A Service Solution
Products and Releases  |  12/12/2013  | 
SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs
ID Experts Adds Medical Identity Alert System
Products and Releases  |  12/12/2013  | 
MIDAS was developed to lower health-care costs through early detection and prevention of health-care fraud
Microsoft Joins FIDO Alliance Board Of Directors
Products and Releases  |  12/12/2013  | 
Microsoft to work with the FIDO Alliance to produce open standards
IT Monitoring Leader Anturis Closes $2 Million Series A Round Of Funding
Products and Releases  |  12/11/2013  | 
Funding led by Runa Capital and VEB Innovations
One In Four U.K. Consumers Have Had Online Accounts Hacked
Products and Releases  |  12/11/2013  | 
Hotmail, Facebook, Yahoo, and PayPal accounts identified as breached most often
Total Defense Adds New Partner Program
Products and Releases  |  12/11/2013  | 
In addition, IDC has recognized Total Defense as a Major Player in the Worldwide Enterprise Messaging Security MarketScape
CloudLock Labs Introduces GeoFence For Google Apps
Products and Releases  |  12/11/2013  | 
Solution allows organizations to track where users are logging in and accessing data from
45% Of Enterprises Believe Employees Are Prepared To Sell Company Data
Products and Releases  |  12/11/2013  | 
SailPoint's "2013 Market Pulse Survey" also showed 57% had experienced the loss of company-owned devices containing sensitive information
EiQ Networks Announces Three New Security Monitoring Tools
Products and Releases  |  12/11/2013  | 
FlowVue, LogVue, and EventVue are free for up to 25 devices
Lieberman Intros Privileged Identity Management For Windows Azure
Products and Releases  |  12/10/2013  | 
Enterprise Random Password Manager manages the entire privileged identity life cycle
Trend Micro Predicts Cybersecurity Concerns For 2014 And Beyond
Products and Releases  |  12/10/2013  | 
Mobile threats, targeted attacks, and vulnerabilities for the Internet of Everything highlighted
OpenDNS Exposes Year's Top Cyberattacks In 3D
Products and Releases  |  12/10/2013  | 
To capture the massive volume and scale of these incidents, OpenDNS created a short 3D video of the DNS activity generated by each of them
New Versions Of SplashID Safe Improve Password Management
Products and Releases  |  12/10/2013  | 
Includes a major update of its consumer-focused Personal Edition
TappIn By Globlascape Now Available On The Samsung Solutions Exchange
Products and Releases  |  12/10/2013  | 
TappIn is one of the initial launch members of Samsung Solutions Exchange
EndGuard Protects BYOD Data
Products and Releases  |  12/10/2013  | 
EndGuard integrates cloud backup and native endpoint data loss prevention capabilities in a centrally managed application
L.A. Gay & Lesbian Center Information Systems Compromised By Cyberthieves
Products and Releases  |  12/10/2013  | 
Attack designed to collect credit card, Social Security numbers, and other financial information
Best Practices For Reducing Traffic Fraud Risk Unveiled By IAB
Products and Releases  |  12/9/2013  | 
IAB is also publishing “Digital Simplified: Understanding Traffic Fraud,” an educational backgrounder on how digital advertising fraud takes place
Infoblox Introduces DNS Appliance That Can Protect Itself
Products and Releases  |  12/9/2013  | 
Infoblox Advanced DNS Protection solution provides multiple levels of defense
DoD Selects Raytheon And GrammaTech To Develop Binary Analysis Security Tool
Products and Releases  |  12/9/2013  | 
Companies to develop tools and techniques to enable organizations to inspect software and firmware inside network-enabled devices
Mitigating Attacks On Industrial Control Systems (ICS); The New Guide From EU Agency ENISA
Products and Releases  |  12/8/2013  | 
Guide provides key considerations for a team charged with ICS Computer Emergency Response Capabilities
Zscaler Upgrade Delivers High-Speed 2048-Bit SSL Traffic Inspection
Products and Releases  |  12/5/2013  | 
Completes migration of cloud infrastructure to enable 2048-bit SSL traffic inspection
F5 Networks Provides Enterprise-Grade Application Delivery Solution For Verizon Cloud
Products and Releases  |  12/5/2013  | 
Verizon embedded F5's suite of application services into Verizon Cloud Compute
FireEye Announces Availability Of Oculus For Small And Midsize Businesses
Products and Releases  |  12/5/2013  | 
Oculus for SMB combines technology, services, and threat expertise
Microsoft, The FBI, Europol And Industry Partners Disrupt The Notorious ZeroAccess Botnet
Products and Releases  |  12/5/2013  | 
Global action aims to protect millions of computers infected with malware that is responsible for hijacked search results and click fraud
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file