Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2013
<<   <   Page 2 / 3   >   >>
Alert Logic Releases New Log Manager To Integrate All Customer Environments
Products and Releases  |  2/22/2013  | 
New Log Manager allows users to manage log data from all of their infrastructure
Anonymous Attacks US State Department Careers Website: Analysis
Products and Releases  |  2/22/2013  | 
Attack appears to be a SQL Injection
TraceSecurity Customers Realize Automated Compliance And Cost-Savings Benefits With Cloud-based TraceCSO IT GRC
Products and Releases  |  2/22/2013  | 
Solution will be publicly demonstrated for the first time at the RSA Conference 2013
SecureAuth Issued Two Patents For User Authentication Methods
Products and Releases  |  2/22/2013  | 
Patents expand BYOD identity/access management
AVG Reports Fourth Quarter And Fiscal Year 2012 Financial Results
Products and Releases  |  2/22/2013  | 
Revenue for the fourth quarter of 2012 was $95.2 million, an increase of 28 percent over 2011
OneID Delivers Online Shoppers Safely to the Front Of The Checkout Line In A Single Click With OneID QuickFill
Products and Releases  |  2/22/2013  | 
Chrome browser extension lets users create and store their personal identities encrypted in a secure cloud
Stormpath Closes $8.2 Million Series A Financing To Deliver Easy User Management For Developers
Products and Releases  |  2/22/2013  | 
New Enterprise Associates and Pelion Venture Partners led the round
Qualys Announces Partnership With Cloud-Based Pen Tester iViZ
Products and Releases  |  2/21/2013  | 
Qualys will combine its QualysGuard Web Application Scanning with iViZ’s Penetration Testing technology
FireMon Expands Situational Awareness With Security Manager 7.0
Products and Releases  |  2/21/2013  | 
Security Manager 7.0 comes with a set of predefined assessments
'Police Virus' Infections On The Rise, Reports PandaLabs
Products and Releases  |  2/21/2013  | 
Malware continues to infect thousands of computers around the world
nCircle Releases Vulnerability Scan App For Apple iDevices
Products and Releases  |  2/21/2013  | 
nCircle Remote allows users to start, monitor, and view the results of IP360 vulnerability scans with their iPhone or iPad
General Dynamics New High-Speed Encryptors Now NSA Certified
Products and Releases  |  2/21/2013  | 
New encryptors can secure and store classified files equal to a Blu-ray disk full of data in less than 6 seconds
Symplified IDaaS Survey Findings
Products and Releases  |  2/21/2013  | 
The average organization now manages up to 50 on-premises applications -- two times the number of cloud-based applications currently managed
Barracuda Networks And Drobo Partner to Provide Ubiquitous Data Access For Drobo Users With Barracuda Networks Copy
Products and Releases  |  2/21/2013  | 
Drobo 5N will be integrated with Copy, a Barracuda Service
TraceSecurity ACloud-based IT GRC Solution To SMEs And SMBs
Products and Releases  |  2/21/2013  | 
TraceCSO delivers comprehensive visibility and accountability for improved risk and compliance profiles
Silent Circle Adds Encrypted Attachment Support To Silent Text
Products and Releases  |  2/21/2013  | 
Silent Text app provides peer-to-peer message encryption between iOS devices
PhishMe Unveils New Features To Address APT At RSA 2013
Products and Releases  |  2/21/2013  | 
Additions include PhishMe's Highly Visible Targets Identifier, Benchmarking, and a new simulation type, the Double Barrel
ESET Secure Authentication: New Two-Factor Authentication (2FA) System Protects Passwords And Prevents Data Breaches
Products and Releases  |  2/21/2013  | 
Application makes use of remote end-users' mobile devices to deliver a one-time password
Entrust Tops 4-Year Financial, Business Goals Under Thoma Bravo Ownership
Products and Releases  |  2/21/2013  | 
Entrust has grown total and product revenue every year since being acquired by Thoma Bravo in 2009
IBM Takes On Security For iOS Enterprise Apps
Products and Releases  |  2/21/2013  | 
IBM AppScan Source 8.7 for iOS builds security analysis early into the development cycle
iScan Online Announces Android App For Mobile Security Scanning
Products and Releases  |  2/20/2013  | 
iScan Online solution is designed to scan thousands of devices simultaneously
Barracuda Networks Launches Ultimate File Sharing, Sync And Storage Service Based On Secure Global Barracuda Cloud
Products and Releases  |  2/20/2013  | 
Copy allows users to securely access, share and sync files from anywhere, and from any device
Healthcare Industry Announces Working Group To Support Cybersecurity Executive Order For Critical Infrastructure Protection
Products and Releases  |  2/20/2013  | 
Group brings CISOs of the nations' largest healthcare organizations together with DHS, DHHS
nCircle IP360 Utilizes Customizable, Python-Based Vulnerability Rules
Products and Releases  |  2/20/2013  | 
New tools augment nCircle’s existing Advance Security Programming Language
Lockheed Martin and Fixmo Offer Secure Gesture Mobile Authentication
Products and Releases  |  2/20/2013  | 
Integrated technologies provide secure authentication for consumer-grade mobile devices
Trusteer Apex Protects Enterprise Endpoint Apps With Exploit Prevention Technology
Products and Releases  |  2/20/2013  | 
Product prevents the exploitation of zero-day or unpatched application vulnerabilities
Duo Security Launches Secure Mobile ID
Products and Releases  |  2/20/2013  | 
Offers two-factor authentication service
6 Tips To Overcome PHI Security Obstacles
Products and Releases  |  2/20/2013  | 
Industry experts presenting at the PHI Protection forum offer six tips
Wombat Launches SmishGuru to Protect Today's BYOD Workforce Against Text Message Phishing Attacks
Products and Releases  |  2/20/2013  | 
Attack simulation service protects corporate networks from malware, spyware, and other malicious software
WhiteHat Security Receives $31 Million Strategic Growth Investment From Leading Investment Firms
Products and Releases  |  2/20/2013  | 
WhiteHat secures the Web applications of some of the largest worldwide brands
F5 BYOD 2.0 Solution Empowers Workers To Merge Productivity And Lifestyle
Products and Releases  |  2/19/2013  | 
Mobile App Manager combines the policy management and secure application delivery
Symantec 2013 State Of Mobility Survey Finds Differences Between Innovative And Traditional Companies
Products and Releases  |  2/19/2013  | 
The two groups perceive the benefits and risks of mobility differently, according to the survey
Coverity Expands Global Footprint
Products and Releases  |  2/15/2013  | 
Announces the opening of four new offices
IEEE Comp. Society Experts Say CALEA Will Weaken U.S. Comm Infrastructure
Products and Releases  |  2/15/2013  | 
Experts argue that there are viable alternatives to the FBI expanding the Communications Assistance for Law Enforcement Act
Huawei Applauds U.S. Executive Order Calling Enhanced Collaboration And Standards To Address Cybersecurity
Products and Releases  |  2/15/2013  | 
Initiatives are in line with Huawei's focus on standard-setting
New HIPAA Omnibus Rule Changes Health IT Security Landscape
Products and Releases  |  2/15/2013  | 
Rule means more audits and increased penalties if compliance is not achieved
Business Roundtable Endorses Bipartisan Cybersecurity Legislation
Products and Releases  |  2/14/2013  | 
"Missing piece of effective cybersecurity is robust, two-way information sharing, with appropriate legal and privacy protections, between business and government," said Business Roundtable President John Engler
New Social Sharing Tool From Veracode
Products and Releases  |  2/13/2013  | 
SmartShare offer developers, bloggers and marketers a more secure method of on-site bookmark sharing
Redspin Issues Assessment Of Current Healthcare IT Security Safeguards
Products and Releases  |  2/13/2013  | 
Company releases annual breach report of protected health information
Vulnerabilities In Mobile And Modern Web Applications Now Detectable With NTOSpider 6.0
Products and Releases  |  2/13/2013  | 
Web application scanner lets security teams automatically crawl, interpret, and scan modern application technologies
Intego Introduces New Mac Security Software
Products and Releases  |  2/13/2013  | 
Intego Mac Internet Security Premium 2013 bundle includes Virus Barrier 2013, Net Barrier 2013, and Identity Scrubber
CyberHive Launches Security-Specific Incubator In San Diego
Products and Releases  |  2/13/2013  | 
Select firms will receive up to $200,000 in start-up capital in addition to business and research mentoring
New Xerox Software System Creates Simpler, Secure Workflow-Supports Cloud, Custom Apps, BYOD
Products and Releases  |  2/13/2013  | 
ConnectKey is a software system embedded in Xerox multifunction printers
Low Merchant PCI Compliance Rates Blamed On Dated Technology
Products and Releases  |  2/13/2013  | 
PCI vendor calls for acquirer/ISO PCI program technology updates to meet merchant needs
National Institute Of Standards And Technology Initiates Development Of New Cybersecurity Framework
Products and Releases  |  2/13/2013  | 
Framework will be a set of voluntary standards and best practices to guide industry in reducing cyber-risks
Cylance Announces $15M In Funding
Products and Releases  |  2/13/2013  | 
Cylance is also announcing its board members and board of advisers
Wave Announces New Windows 8 Tablet Security Offering For Enterprises
Products and Releases  |  2/12/2013  | 
Eliminates need for mobile device management
Sophos Extends UTM To The Enterprise
Products and Releases  |  2/12/2013  | 
Sophos RED 50 centrally manages UTM for midsize branch offices
U.S. Is Spam World Champion
Products and Releases  |  2/12/2013  | 
One in 60 e-mails contained malware in January
CA Technologies Announces CA CloudMinder - IAM As-A-Service
Products and Releases  |  2/12/2013  | 
Three components of CA CloudMinder can be deployed individually or together in a single, integrated IAM service
<<   <   Page 2 / 3   >   >>

COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.