Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2010
Page 1 / 4   >   >>
Banker Trojans Comprised More Than 60 Percent of New Threats Created in Q1, Finds PandaLabs
Products and Releases  |  3/31/2010  | 
Traditional viruses made up more than 15 percent of all malware, despite having shown a dramatic decrease in recent years
SCM Rolls Out Computer Lock, Password Manager on a Smart Card-Secured USB Stick
Products and Releases  |  3/31/2010  | 
New consumer gadget securely stores all passwords on a USB stick, contains smart card chip inside
Sourcefire Extends IPS to Xen Virtualization Platform
Products and Releases  |  3/30/2010  | 
Sourcefire 3D System now protects XEN virtual environments
BigFix Launches Global Partner Network
Products and Releases  |  3/30/2010  | 
Program expands BigFix's global presence with channel partners, OEMs and technology alliances
New Forensic Software Automates Router Investigations
Products and Releases  |  3/30/2010  | 
Free for law enforcement agencies
Comodo Upgrades HackerGuardian
Products and Releases  |  3/30/2010  | 
Makes PCI vulnerability scanning requirements simpler
European Commission Launches New Privacy Project
Products and Releases  |  3/29/2010  | 
New three-year project funded by the European Commission studies privacy implications of emerging technologies such as new identification and surveillance technologies, biometrics, on-the-spot DNA sequencing
SECNAP Adds Outbound Filtering, Other New Features to Email Security in the Cloud
Products and Releases  |  3/29/2010  | 
New features include outbound filtering for viruses and attachments, outbound content filtering, advanced backscatter protection
Survey: iPhone Poses Biggest Smartphone Security Risk
Products and Releases  |  3/29/2010  | 
57 of respondents in nCircle survey believe the iPhone carries the greatest security risk
Heartland E3 Adopted By Leading Payments Manufacturers
Products and Releases  |  3/26/2010  | 
End-to-end encryption solution provides interoperability
SonicWALL Introduces Modular UTM Firewall
Products and Releases  |  3/26/2010  | 
NSA 2400MX designed with high-port density and dual expansion module slots
Trustwave, Secure128 Partner In PCI
Products and Releases  |  3/26/2010  | 
Secure128 will resell Trustwave's TrustKeeper SSL Plus package to customers and partners
HyTrust Launches HyTrust Appliance Version 2.0
Products and Releases  |  3/26/2010  | 
New version adds Policy Federation, Full-Index Search, and Root Password Vault features
Dual Biometric Reader Verifies Identity By Either Face, Fingerprint, RFID And/Or PIN
Products and Releases  |  3/26/2010  | 
iFace can store up to 10,000 fingerprint templates, 700 face templates, and 100,000 transactions
United States Ranks Fifth Most Popular Spam Originator Worldwide, According To New Research From PandaLabs
Products and Releases  |  3/24/2010  | 
Results based on analysis of nearly five million spam messages generated in January and February 2010
Vircom Offers New Email Security Virtual Machine
Products and Releases  |  3/24/2010  | 
Adds anti-spam virtualization to its arsenal with modusGate VM software
Accelops Rolls Out VMWare Intelligence
Products and Releases  |  3/24/2010  | 
Advances include application monitoring via synthetic transactions, hardware monitoring and storage monitoring
eBay, National Retail Federation Partner To Fight Organized Retail Crime
Products and Releases  |  3/24/2010  | 
Partnership provides for greater information sharing to target ORC investigations
New Verizon Enterprise IT Analysis Service Helps Enterprises Manage And Protect Their IT Systems
Products and Releases  |  3/24/2010  | 
Service is ideal for organizations that lack dedicated staffing to document network resources
Solutionary Expands Web Application Firewall Services
Products and Releases  |  3/23/2010  | 
Customers receive more 24/7 compliance and protection
Credit Union Offers Mobile Banking Security Tips
Products and Releases  |  3/23/2010  | 
Mobile banking is essentially safe, but fraud is on the rise, so consumers need to be aware
Sunbelt Software Upgrades Next-Generation Dynamic Malware Analysis Tool
Products and Releases  |  3/23/2010  | 
CWSandbox v3.0 enables security pros to analyze the behavior of suspected files by executing code inside a controlled and monitored environment
First-Ever Web Application Attack Component Part Of College Cyber Defense Competition
Products and Releases  |  3/23/2010  | 
Event focuses on teaching students to protect networks and Web apps against cyberattacks
Core Security Expert Details Advanced SQL Injection Testing
Products and Releases  |  3/23/2010  | 
Leading penetration testing specialist to demonstrate methods that boost accuracy of automated SQL injection assessment
Trends In E-Waste Show Increase In Compliance Effort
Products and Releases  |  3/23/2010  | 
Digital fingerprints more important that carbon footprints, according to Converge and Osterman Research
McAfee Rolls Out Next-Generation DLP
Products and Releases  |  3/23/2010  | 
McAfee Data Loss Prevention technology is planned to include a common policy across all components, database crawling
Lancope Introduces Data Loss Alarming In NetFlow-based StealthWatch System
Products and Releases  |  3/23/2010  | 
Feature alerts organizations of potential data extrusions regardless of data format, protocol or encryption technique
Klocwork Enhances Vulnerability Analysis
Products and Releases  |  3/23/2010  | 
Integrated support for CWE, CERT and SAMATE initiatives helps developers eliminate exploitable security issues
CyberPatrol Offers Parents Online Chat Monitoring For Child Safety
Products and Releases  |  3/23/2010  | 
CyberPatrol Online Protection helps to protect children from cyber-bullying, cyber predators and exposure to pornography
Comodo Rolls Out Cloud Scanner Portable Utility
Products and Releases  |  3/23/2010  | 
Tool identifies malware, viruses, suspicious processes and other problems that are commonly present on PCs
gWallet Partners With TRUSTe In Virtual Currency
Products and Releases  |  3/22/2010  | 
Partnership will begin with certification of gWallet Web site
Secunia Rolls Out 'One Stop' Patch Solution That Integrates With Microsoft WSUS, SCCM
Products and Releases  |  3/22/2010  | 
Secunia Corporate Software Inspector follows a four-step
Novell Unveils ZENworks Configuration Management Virtual Appliance
Products and Releases  |  3/22/2010  | 
New virtual appliance and latest ZENworks enhancements simplify Windows 7 migrations
Trustwave Launches Managed Security Portal
Products and Releases  |  3/22/2010  | 
Portal integrates all customer compliance and security solutions into a single dashboard
Products and Releases  |  3/22/2010  | 
Free update offers significant enhancements to the Web GUI and support for EPS and the Windows 7 VPN SS
Electrone Customized PIN Pads May Help Prevent Identity Theft
Products and Releases  |  3/22/2010  | 
PIN pads are adaptable to most cashless payment systems
Protecode Offers Integration With Development And Application Lifecycle Management Processes
Products and Releases  |  3/22/2010  | 
Library IP Auditor analyzes code deposited into the organization's Source Control Management (SCM) library to ensure compliance with the company's established IP policy
VirnetX Patent Claims Confirmed Valid In VPN Technology Dispute With Microsoft
Products and Releases  |  3/19/2010  | 
U.S. Patent Office confirms three claims
N.H. Lawmakers Reject Broad Restrictions On Biometrics
Products and Releases  |  3/18/2010  | 
Vote followed advocacy effort by Security Industry Association
Japan's Anti-Phishing Council and JPCERT/CC Offer Online Training Game For Phishing Training
Products and Releases  |  3/18/2010  | 
Launch a Japanese version of Wombat Security Technologies' Anti-Phishing Phil game to train Japanese user community not to fall for phishing attacks
RSA Survey: Spring Break Punches Holes In Security
Products and Releases  |  3/18/2010  | 
Survey revealed that 32 percent of enterprises are receiving marginal to failing grades when it comes to adequately detecting, tracking, and reporting network activity and user access behavior
Senate Unveils Bipartisan Cybersecurity Legislation
Products and Releases  |  3/18/2010  | 
Rockefeller-Snowe Cybersecurity Act provides a framework for engagement and collaboration between the private sector and government on cybersecurity
FireHost Rolls Out Secure Server Hosting
Products and Releases  |  3/17/2010  | 
Redundant firewalls help ensure uninterrupted protection from malice on the Web
FireID Launches Mobile Two-Factor Authentication Platform For Online And Mobile Banking
Products and Releases  |  3/17/2010  | 
FireID Authentication Platform for Banks protects financial transactions against sophisticated threats
Fifth Third Processing Solutions Announces Enterprise Security And Encryption
Products and Releases  |  3/17/2010  | 
Working with Voltage Security to offer several new customer solutions focused on the protection of sensitive cardholder information
Promisec Releases New Clientless Inventory Module
Products and Releases  |  3/17/2010  | 
Solution works without a client installed on the endpoints or servers
TrustPort Upgrades Net Gateway For Faster Malware, Spam Scanning
Products and Releases  |  3/17/2010  | 
TrustPort Net Gateway 5.5 includes faster scanning, advanced monitoring and filtering of Web traffic
Cell Phone As A Survival Tool With Silent Bodyguard From LiveSecure.org
Products and Releases  |  3/17/2010  | 
Sends SOS distress signal with GPS coordinates to immediately reach potential rescuers
Gartner Says 60 Percent of Virtualized Servers Will Be Less Secure Than the Physical Servers They Replace Through 2012
Products and Releases  |  3/16/2010  | 
Gartner has identified the six most common virtualization security risks together with advice on how each issue might be addressed
McAfee Announces Secure The Cloud Initiative
Products and Releases  |  3/16/2010  | 
Amazon Web Services and SuccessFactors are expected be among the first providers to leverage the new program
Page 1 / 4   >   >>

Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...
PUBLISHED: 2021-06-14
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the...