Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2012
<<   <   Page 3 / 3
Carnegie Mellon's Information Networking Institute Launches Online Information Assurance Program For Global Leaders
Products and Releases  |  2/9/2012  | 
Program offers a concentration in cyberforensics and incident response (CyFIR) or resilience management
New, Free Online Privacy Tool For Consumers Unveiled
Products and Releases  |  2/9/2012  | 
Abine's Do Not Track Plus gives consumers the ability to block tracking and stop profiling
F5’s Certified Firewall Protects Against Large-Scale Cyber Attacks On Public-Facing Websites
Products and Releases  |  2/9/2012  | 
F5 BIG-IP product family has been certified by ICSA Labs as a network firewall
Akamai Reports Fourth Quarter 2011 And Full-Year 2011 Financial Results
Products and Releases  |  2/9/2012  | 
Annual revenue increased 13 percent year-over-year to $1,159 million
Websense Reports Record Revenues For Fourth Quarter And Fiscal Year 2011
Products and Releases  |  2/9/2012  | 
Fourth quarter revenue of $92.7 million, up 7 percent year-over-year
CloudPassage Launches Halo NetSec
Products and Releases  |  2/9/2012  | 
New service defends servers running in public clouds like EC2 and Rackspace
eIQnetworks Reports Q3 Financials
Products and Releases  |  2/9/2012  | 
Revenue was up 60 percent from the same quarter a year earlier
New Privacy, Security, Anti-Tracking Software For Internet Explorer
Products and Releases  |  2/8/2012  | 
Cocoon prevents computer from directly touching the Internet
MasterCard And Silver Tail Systems To Bring Online Fraud Solutions To U.S.
Products and Releases  |  2/8/2012  | 
Alliance will enable online merchants differentiate fraudsters from legitimate consumers
Survey: Mobile Computing Is The "New Normal" For Federal Employees
Products and Releases  |  2/8/2012  | 
More than half of federal employees use at least one mobile device at work, according to CDW-G’s Federal Mobility Report
Role-Based Encryption Provides Data Protection For Enterprises
Products and Releases  |  2/8/2012  | 
6.2 of SecureFolder Enterprise offfers optimized client management, integration into Web-based management console
Beware Of Valentine's Day Infections, Warns PandaLabs
Products and Releases  |  2/8/2012  | 
PandaLabs offers tips to avoid computer viruses on Valentine’s Day
New Data Shows Rapid Surge In Phishing Email
Products and Releases  |  2/8/2012  | 
Yet spam in December 2011 and January 2012 at the lowest levels in five years
SailPoint AndSymantec Partner To Integrate the Leading Identity Governance And Data Loss Prevention Solutions
Products and Releases  |  2/8/2012  | 
Symantec Data Loss Prevention combined with SailPoint IdentityIQ provides customers with improved context of DLP policy violations
SIA Comments To FTC On Benefits Of Facial Recognition Technology
Products and Releases  |  2/8/2012  | 
SIA addressed when privacy could be a concern with facial recognition
M86 Security Releases New Biannual Labs Report
Products and Releases  |  2/8/2012  | 
Report details significant growth in cybercrime in the second half of 2011
Splunk Launches Big Data Security Solution
Products and Releases  |  2/8/2012  | 
Enterprise Security Intelligence Solution identifies threats hidden as patterns in terabytes of data
Yubico Partners With SSO Easy
Products and Releases  |  2/6/2012  | 
SSO Easy has integrated YubiKey support in EasyConnect
Hungarian Citizen Sentenced In Maryland to 30 Months in Prison for Hacking into Marriott Computers To Extort Employment From The Company
Products and Releases  |  2/6/2012  | 
Loss to Marriott as a result of the intentional damage caused by Nemeth was approximately $1 million
Report: Smaller DDoS Attacks Can Be Deadlier
Products and Releases  |  2/6/2012  | 
Reports busts several myths about the way the industry views the impact of distributed DDoS attacks
SocialShield Releases the Top Social Networking Terms Kids Don't Want Their Parents To Know
Products and Releases  |  2/2/2012  | 
Sheds light on the latest lingo kids are using to hold illicit, risky, or secretive conversations
Yubico And CloudPassage Bring Easy, Secure Two-Factor Authentication To Cloud Servers
Products and Releases  |  2/2/2012  | 
USB key is a key component of Halo GhostPorts
CloudPassage Launches Network Security In The Cloud Inbox
Products and Releases  |  2/1/2012  | 
Halo NetSec aimed at companies running servers in public clouds like EC2 and Rackspace
Vulnerabilities Reported In Mac Encryption Products
Products and Releases  |  2/1/2012  | 
Passware Kit Forensic v11.3 recovers Mac OS user login passwords
Backupify Announces Security Best Practices, Adds Multiple Layers Of Protection To Cloud Application Data Backup
Products and Releases  |  2/1/2012  | 
Backup solutions provider successfully completes penetration testing
<<   <   Page 3 / 3

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-14
An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user.
PUBLISHED: 2021-04-14
An issue was discovered in MDaemon before 20.0.4. Remote Administration allows an attacker to perform a fixation of the anti-CSRF token. In order to exploit this issue, the user has to click on a malicious URL provided by the attacker and successfully authenticate into the application. Having the va...
PUBLISHED: 2021-04-14
An issue was discovered in MDaemon before 20.0.4. There is an IFRAME injection vulnerability in Webmail (aka WorldClient). It can be exploited via an email message. It allows an attacker to perform any action with the privileges of the attacked user.
PUBLISHED: 2021-04-14
An issue was discovered in MDaemon before 20.0.4. Administrators can use Remote Administration to exploit an Arbitrary File Write vulnerability. An attacker is able to create new files in any location of the filesystem, or he may be able to modify existing files. This vulnerability may directly lead...
PUBLISHED: 2021-04-14
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Multiple privilege escalation vulnerabilities were discovered in version 5.2.4 of Pi-hole core. See the referenced GitHub security advisory for details.