Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2013
<<   <   Page 2 / 2
Check Point Rolls Out Threat Emulation Software Blade
Products and Releases  |  3/12/2013  | 
Solution stops zero-day and unknown exploits from infecting networks
SQN Banking Systems Now Offering Cloud-Based Fraud Detection
Products and Releases  |  3/12/2013  | 
SENTRY applications will be offered as a cloud-based, SaaS model
Spam Levels Almost Double In February
Products and Releases  |  3/12/2013  | 
According to Eleven Research Team, spam volume rose by 92.2 percent compared to previous month
iPhone Gets Hardware-Based Voice Encryption
Products and Releases  |  3/12/2013  | 
Uses a MicroSD chip for encryption
SpiderOak Unveils Crypton 'Zero-Knowledge' Application Framework
Products and Releases  |  3/12/2013  | 
Crypton makes it possible to build cryptographically secure applications
Open NAC Integrates With All BYOD Solutions
Products and Releases  |  3/12/2013  | 
Bradford Networks launches Network Sentry SmartEdge Platform
Trend Micro Unveils End User Data Protection Solutions for Today's Post-PC Environments
Products and Releases  |  3/12/2013  | 
Trend Micro Enterprise Security and Data Protection mitigates risks of attacks and breaches across platforms
UBM Tech: Black Hat Europe Happening March 12-15
Products and Releases  |  3/12/2013  | 
Content includes technical Trainings and Workshops along with the most relevant, detailed, and insightful security presentations of the year
Tripwire Acquires nCircle
Products and Releases  |  3/11/2013  | 
Acquisition is expected to close in April
New Research Reveals: Consumers Crying Out For Better Personal Data Security In Call Centers
Products and Releases  |  3/11/2013  | 
Banks top the list of organizations consumers trust least with their personal data, according to an Avaya survey
GLOBO Signs U.S. And Canada Agreement With Ingram Micro And Announces Enterprise Mobility In A Box For SMBs
Products and Releases  |  3/8/2013  | 
Allows small businesses with up to 150 devices to securely run and manage their BYOD mobile workforce
AVG Technologies Announces Change To Executive Leadership Team
Products and Releases  |  3/7/2013  | 
J.R. Smith has resigned as CEO
U.S. Businesses Lack Stringent BYOD Policies
Products and Releases  |  3/7/2013  | 
ThreatMetrix releases results of 2012 State of Cybercrime study
Prolexic Mitigates DDoS Attack Against U.S. Utility Company
Products and Releases  |  3/7/2013  | 
Attackers now targeting network infrastructures that cause collateral damage
Tom Ridge, Howard Schmidt Launch New Cybersecurity Executive Services Firm
Products and Releases  |  3/6/2013  | 
Ridge Schmidt Cyber LLC will provide strategic and advisory services
SNARE SIEM Server Version 6.0 Includes a Comprehensive Query Builder And Modern Browser User Interface
Products and Releases  |  3/6/2013  | 
Allows for custom configuration of agent event log objective-setting and monitoring capabilities
Survey: Half Of Companies Have Lost A Device With Important Data
Products and Releases  |  3/6/2013  | 
According to Varonis, almost three quarters of employees are now allowed to access company data from their personal devices
Tips For ID Theft Protection During Tax Season
Products and Releases  |  3/6/2013  | 
Experian's ProtectMyID outlines ways consumers can protect themselves
Cenzic Trends Report 2013 -- 99% Of Apps Tested Have Vulnerabilities
Products and Releases  |  3/6/2013  | 
Report demonstrates overwhelming presence of Web application vulnerabilities remains a constant problem
HID Global Brings Compliant Strong Authentication To Healthcare
Products and Releases  |  3/4/2013  | 
Will showcase converged solutions and services for physical and logical access control at the HIMSS show
YooCare Announces It Has Helped to Resolve More Than 100,000 Cases Of Malware Or Virus Removal
Products and Releases  |  3/4/2013  | 
One of the most common issues that clients have needed help with is learning how to remove the FBI virus
VASCO Expands Authentication Platform
Products and Releases  |  3/4/2013  | 
Releases enhanced version of MYDIGIPASS.COM platform
Zscaler Brings Big Security Visibility To The Dloud
Products and Releases  |  3/4/2013  | 
Provides role-based access control
NSS Labs Releases Next Generation Firewall Group Test Reports
Products and Releases  |  3/4/2013  | 
NSS' research yielded several key conclusions
Raytheon Announces Collaboration With Homeland Security On Cyberthreats
Products and Releases  |  3/1/2013  | 
Raytheon will receive active, malicious cybersecurity threat information furnished by DHS
Identity Theft Is #1 Complaint Again...13 Years In A Row
Products and Releases  |  3/1/2013  | 
Of the 369,132 complaints reported in 2012 to the FTC, 46.4 percent involved issues with government documents or benefits fraud
"The Risk Of Insider Fraud" Ponemon/Attachmate Survey
Products and Releases  |  3/1/2013  | 
On average, it takes 87 days to first recognize that insider fraud has occurred, according to survey of more than 700 individuals at leading global organizations
<<   <   Page 2 / 2

DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-19
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
PUBLISHED: 2019-11-19
Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the 'themename' parameter by setting default, modifying and deleting themes. A remote attacker with Zikula administrator privilege could use this flaw to execute arbitrary HTML or web script code in the context ...
PUBLISHED: 2019-11-19
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
PUBLISHED: 2019-11-19
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI ...
PUBLISHED: 2019-11-19
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.