Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2012
Page 1 / 2   >   >>
Rapid7 Sponsors Open Source Projects In Magnificent7 Program
Products and Releases  |  3/30/2012  | 
Program created to fuel the success of seven bleeding-edge open source projects
Kaspersky Lab Announces New Generation Of Ultimate PC Protection For Your Home
Products and Releases  |  3/29/2012  | 
Kaspersky PURE 2.0 Total Security includes proactive defenses against emerging threats
FFT Rolls Out Perimeter Security Intrusion Detection System Inbox
Products and Releases  |  3/29/2012  | 
FFT Aura can be applied to both fence mounted and buried applications
Avira Protects Macs With Free Security Software
Products and Releases  |  3/29/2012  | 
Avira Free Mac Security comes fully licensed for consumers and businesses
World Backup Day This March 31st
Products and Releases  |  3/29/2012  | 
reddit emphasizes importance of data security with the Internet community
OTA Issues Top 10 Tips For Businesses to Protect Consumers From Being Fooled
Products and Releases  |  3/29/2012  | 
Online Trust Alliance's list in preparation for April Fool's Day
Avira Acquires SocialShield
Products and Releases  |  3/29/2012  | 
Avira will incorporate SocialShield's social network monitoring technology into its free security product portfolio
Bit9 Sees A 150 Percent Increase In Targeted Domain Controller Attacks
Products and Releases  |  3/29/2012  | 
Attackers, largely nation-states and cybercriminals, are targeting intellectual property
Information Security Forum Launches Threat Horizon 2014
Products and Releases  |  3/28/2012  | 
Report challenges the traditional approach to managing security risks
Uncertainty Brings Heightened Risk Awareness In New Era, Says PwC US
Products and Releases  |  3/28/2012  | 
First annual report, titled Risk in Review, examines the state of global risk and discusses risk management approaches
Ciena And SafeNet Join Forces On Ethernet Link Encryption
Products and Releases  |  3/27/2012  | 
Companies to jointly sell high-speed, low-latency Ethernet link encryption solutions specifically designed to work at Layer 2
Blue Coat Names Industry Veteran As Chief Operating Officer And President
Products and Releases  |  3/27/2012  | 
David Murphy was previously president and general manager of IBM Tivoli
ThreatMetrix: ThreatMetrix Secures $18 Million Series D Financing
Products and Releases  |  3/27/2012  | 
Vivek Mehra, general partner of August Capital, also joins the ThreatMetrix board
EZShield Launches Comprehensive Portfolio Of Security Planning And Breach Services For Small Businesses
Products and Releases  |  3/23/2012  | 
EZShield SycurityMax Business Suite is comprised of two solutions, Sycurity Assist and Sycurity Prepare
TrustPort Issues Enhanced Central Management Console
Products and Releases  |  3/23/2012  | 
TrustPort Management allows remote installation and configuration of TrustPort software
Integrated Solution Turns NFC Handsets, Laptops Or Tablets Into Virtual Point-of-Sale Terminals
Products and Releases  |  3/23/2012  | 
Integrated solution enables a smartphone, tablet, or other device to act as a secure terminal
Quest Foglight NMS Offers Market’s Only Complete Network Monitoring Tool For Avaya VoIP System
Products and Releases  |  3/23/2012  | 
Foglight Network Management System allows network engineers to better address dropped calls, poor voice quality
GlobalSign Launches Open Source PHP Library For Fully Automated SSL Secure Site Activation
Products and Releases  |  3/23/2012  | 
OneClickSSL service automates the usual SSL process
New ISP Anti-Bot Code Just Passed
Products and Releases  |  3/23/2012  | 
Voluntary code is the first unified industry effort to cooperatively address the bot problem on a broad scale
Lookout Projects Lost And Stolen Phones Could Cost U.S. Consumers Over $30 Billion In 2012
Products and Releases  |  3/23/2012  | 
Demographics and behavior are the largest factors influencing phone loss, according to Lookout Labs
National Survey Uncovers Data Breach Vulnerabilities In The Workplace
Products and Releases  |  3/22/2012  | 
Fellowes found that 81 percent of office employees have access to paper documents containing sensitive workplace information
(ISC)² Creates Harold F. Tipton Memorial Scholarship Fund
Products and Releases  |  3/22/2012  | 
Tipton, who founded (ISC)2, passed away March 16
U.S. Anti-Bot Code of Conduct For ISPs Unveiled
Products and Releases  |  3/22/2012  | 
OTA has been working with the FCC and leading ISPs to develop this ABCs for ISPs
Ping Identity Launches PingOne
Products and Releases  |  3/20/2012  | 
Enables tier 1 Single Sign-On (SSO) access to all cloud applications
Symantec To Acquire Mobile App Management Company Nukona
Products and Releases  |  3/20/2012  | 
Acquisition complements Symantec's acquisition earlier this month of Odyssey Software
ControlScan Rolls Out Managed Network Firewall
Products and Releases  |  3/15/2012  | 
ProTect Network Firewall simplifies network segmentation to aid small merchants in reducing the scope of PCI compliance
StopTheHacker Launches New Suite Of SaaS Website Security Service Offerings
Products and Releases  |  3/15/2012  | 
New product packages include automatic malware removal and scanning of corporate Facebook walls for malicious content
New Free Mobile App Alerts Users When Their Personal Data Has Been Compromised
Products and Releases  |  3/14/2012  | 
AllClear ID Mobile is available in the Apple App Store as an application for iOS devices
Legacy Infrastructure Will Fail To Meet Regulatory Compliance Objectives, Say Over 70% Of Banking And Insurance Professionals
Products and Releases  |  3/14/2012  | 
Interxion research is focused on the impact of anticipated regulation of the financial services industry
Silver Tail Systems Introduces Profile Analyzer To Protect Websites From Cyberattacks And Fraud
Products and Releases  |  3/14/2012  | 
Solution provides real-time analysis of both individual user behavior and crowd behavior
Rustock Botnet: One Year Later
Products and Releases  |  3/14/2012  | 
Spam volumes at lowest point in years
FileTrek Survey: 90% Of American Adults Believe People Share Company Confidential Information Outside The Company
Products and Releases  |  3/14/2012  | 
Study also shows generational gap in attitudes towards handling confidential files in the workplace
NetSTAR Announces Secure Web Browsers For iPhones, iPads, And Android Devices
Products and Releases  |  3/14/2012  | 
Web browsers interface with NetSTAR's Cloud servers and utilize NetSTAR inCompass Web-filtering technology
Microsoft SharePoint And LinkedIn data At Risk From Framesniffing Attacks
Products and Releases  |  3/13/2012  | 
Attack bypasses browser security restrictions
Computop Launches Global PoS Network
Products and Releases  |  3/13/2012  | 
Computop Global PoS Network integrates MagTek IPAD EMV terminals with Paygate 5.0 to remove the need to receive actual card data during a PoS transaction in-store
Survey Finds Small Businesses Ignore Risks Of Data Protection On Mobile Devices
Products and Releases  |  3/13/2012  | 
Study profiled several professions that routinely handle sensitive client information
ICANN Appoints IID's Rod Rasmussen To Security And Stability Advisory Committee
Products and Releases  |  3/13/2012  | 
Rasmussen to help global coordinator for domain names in its mission to help keep ahead of threats to the Internet's infrastructure
AV-Test Reissues Android AV Test
Products and Releases  |  3/13/2012  | 
Joint statement from AV-Test.org and MYMobileSecurity
StopTheHacker Launches New Suite Of SaaS Website Security Protection Products
Products and Releases  |  3/13/2012  | 
Upgraded suite includes health monitoring, reputation and blacklist monitoring, and vulnerability assessment
Carnegie Mellon CyLab Researchers Develop New Smartphone App To Protect Consumers From Cybercriminals And Unsafe Communications
Products and Releases  |  3/12/2012  | 
SafeSlinger provides secure communications and file transfer even if the servers involved are tainted with malware
Trend Micro Announces New Secure Password Management Product
Products and Releases  |  3/12/2012  | 
DirectPass synchronizes online credentials across PCs, mobile phones, and tablets
SafeNet Acquires Cryptocard
Products and Releases  |  3/12/2012  | 
Combined companies' offerings will enable customers to more effectively tailor, deploy, and manage their authentication strategies
The Open Group Releases Preliminary Criteria For New Global Technology Supply Chain Security Standard
Products and Releases  |  3/9/2012  | 
O-TTPS will provide an open standard for organizational best practices
Solera Networks Enhances Malware Protection, Alerting And Analysis
Products and Releases  |  3/9/2012  | 
Enhances DeepSee platform with Real-Time File Extractor
Dome9 Security Launches Free Cloud Security For Unlimited Number Of Servers
Products and Releases  |  3/9/2012  | 
Dome9 Lite Cloud provides centralized firewall management
RSA Chief Rallies Industry to Improve Trust In The Digital World, After Year Filled With Cyberattacks
Products and Releases  |  3/9/2012  | 
"Our mindset must shift away from playing defense and tracking meaningless individual events," said Art Coviello
ThreatMetrix Launches ThreatMetrix Labs
Products and Releases  |  3/9/2012  | 
First report explores the different ways fraudsters can deploy MitB Trojans on Mac OS X
StillSecure Enables Organizations To Safely Allow Mobile Devices
Products and Releases  |  3/9/2012  | 
Safe Access 6.0 also provides IAV reporting capabilities for its federal and DoD customers
New ANSI Report Calls For Enhanced Security To Safeguard Protected Health Information
Products and Releases  |  3/9/2012  | 
Report is a call to action for healthcare to invest more to protect patient information
IronKey Launches New Trusted Access Service For Extended Enterprise Management
Products and Releases  |  3/9/2012  | 
Secures access to public and private clouds
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...