Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2014
Fraudsters use BBC real news as bait to steal users' identity
Products and Releases  |  3/31/2014  | 
The URL takes you to the real BBC News website
BlackBerry Earns 'Full Operational Capability' with U.S. Department of Defense
Products and Releases  |  3/28/2014  | 
Validation completes DISAs certification process for BlackBerry 10 mobility management platform
Fortinet delivers FortiGate-VM on Amazon Web Services (AWS)
Products and Releases  |  3/28/2014  | 
FortiGate-VM on AWS to Help Customers Extend Enterprise Security Into Their Public Cloud Deployments
New USB Enforced Encryption Device for Mac OS
Products and Releases  |  3/28/2014  | 
Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices
FireEye Releases Comprehensive Analysis of 2013 Zero-day Attacks; Impact on Security Models
Products and Releases  |  3/27/2014  | 
New Research Paper Offers Insight into Industrys Leading Zero-day and Advanced Threat Detection Models
ThreatMetrix Secures $20 Million Series E Financing
Products and Releases  |  3/27/2014  | 
Company Reveals Aggressive Plans to Expand the Largest Shared Global Identity Network
Is Your Tax Return Being Targeted by Cybercriminals?
Products and Releases  |  3/26/2014  | 
With tax season underway, iovation cautions businesses and taxpayers to safeguard personal data
BlackBerry Advances Security of its Multi-Platform Mobility Portfolio with New Cryptography Certification
Products and Releases  |  3/26/2014  | 
FIPS 140-2 validation granted for Secure Work Space for iOS and Android
SANS Report Shows Jump In Attacks On Industrial Control Systems
Products and Releases  |  3/26/2014  | 
More Breaches Identified; Vulnerability Detection Limited; Shared Responsibility
SANS Report Shows Jump In Attacks On Industrial Control Systems
Products and Releases  |  3/26/2014  | 
More Breaches Identified; Vulnerability Detection Limited; Shared Responsibility
NSFOCUS DDoS Threat Report 2013: Nearly 28 Attacks Per Hour
Products and Releases  |  3/26/2014  | 
'Hackernomics' drives smaller, shorter and repeated attacks for better efficiency
Liberty International Underwriters to Provide Network Activity Monitoring through BitSight Technologies for LIU Data Insure Policyholders
Products and Releases  |  3/26/2014  | 
Insurer partners with BitSight Technologies to deliver big data analysis capabilities to policyholders
Alert Logic Adds Capabilities To Enhance Hybrid IT Security
Products and Releases  |  3/25/2014  | 
Announces upgraded versions of its Alert Logic Threat Manager and Alert Logic Web Security Manager solutions
Synopsys Completes Coverity Acquisition
Products and Releases  |  3/25/2014  | 
Companies intend to improve software quality and help ensure mission-critical applications are built to withstand increasing security threats
Parallels Survey Of IT Professionals Finds Macs Moving Beyond BYOD Phenomenon, Now Considered For Broader Corporate Deployment
Products and Releases  |  3/25/2014  | 
Macs are in high demand, and those who already support them shared the top reasons why
Neurotechnology Announces Major Updates To Entire Biometric Product Line
Products and Releases  |  3/17/2014  | 
Latest product versions include algorithm improvements for functionality enhancement and higher recognition accuracy
NetIQ Unveils NetIQ MobileAccess
Products and Releases  |  3/17/2014  | 
Virtual appliance enables secure access from iOS or Android mobile devices
FireHost Names New CEO
Products and Releases  |  3/17/2014  | 
Founder and former CEO Chris Drake will be CTO
Adblock Plus Expands Anti-Tracking Privacy Tool
Products and Releases  |  3/17/2014  | 
EasyPrivacy filter blocks tracking resources, such as cookies, scripts, and tracking pixels
Lookout Appoints New CEO Jim Dolce
Products and Releases  |  3/17/2014  | 
Founder John Hering will become executive chairman and have a day-to-day role at Lookout
Finjan Holdings Subsidiary Files New Patent Infringement Lawsuit Against Sophos
Products and Releases  |  3/17/2014  | 
Alleges infringement of Finjan patents relating to endpoint, Web, and network security technologies
High-Bandwidth NTP Amplification DDoS Attacks Escalate 371 Percent in the Last 30 days
Products and Releases  |  3/12/2014  | 
Prolexic Issues High Alert DDoS Attack Threat Advisory
IT Security Pros Abandoning Traditional Security Measures In Favor Of SMS-Based Two-Factor Authentication
Products and Releases  |  3/12/2014  | 
Ponemon and Tyntec survey finds 68% believe username/passwords not enough
Latest Security Technology Market Research Study From 451 Research
Products and Releases  |  3/10/2014  | 
Information security 2013 budgets con­tinued a healthy multiyear run
New Data From PerspecSys Shows Without Security, Clouds Can't Reign
Products and Releases  |  3/10/2014  | 
Survey results from RSA Conference show companies are not being proactive enough to protect sensitive data in the cloud
MTN Government Launches Social Media Threat Intelligence Managed Service
Products and Releases  |  3/10/2014  | 
Solution identifies and analyzes malicious actors, threats, and targeted attacks against U.S. government leaders and agencies
HBGary Announces Advanced Endpoint Security, Incident Detection And Enhanced User Efficiency With Active Defense 1.4
Products and Releases  |  3/10/2014  | 
Active Defense 1.4 includes enhanced filtering, customized Web-based dashboards
Robert Anderson, Jr. Named To Lead FBI Criminal, Cyber, Response, And Services Branch
Products and Releases  |  3/10/2014  | 
He will be responsible for all criminal and cyber investigations worldwide
AlephCloud Gets Patent for Keeping Content Private from Cloud Providers
Products and Releases  |  3/8/2014  | 
Invention Enables Cloud Providers to Supply Encryption for Multi-Party Collaboration that only the Content Owner Controls
Wave Joins The FIDO Alliance
Products and Releases  |  3/7/2014  | 
FIDO specifications will support a full range of authentication technologies
CloudLock Announces Compliance For Google+
Products and Releases  |  3/7/2014  | 
CloudLock customers can now leverage one social networks while applying security and compliance policies to protect data
New AppRiver Survey: IT Security Pros Care More About Malware Than NSA Spying
Products and Releases  |  3/7/2014  | 
More than half of respondents report cybercrime from external sources as most problematic
FireEye Issues Secondary Public Offering
Products and Releases  |  3/7/2014  | 
Announcement follows IPO in September and $1 billion acquisition of Mandiant
IPR International Partners With AFORE To Offer Encryption As A Service (EaaS)
Products and Releases  |  3/6/2014  | 
Encryption solutions are available at the storage, virtual machine, file, and application levels
New IT Security Survey Results -- Top Reasons To Monitor Users
Products and Releases  |  3/6/2014  | 
BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology
TraceSecurity Announces Mutual Referral Partnership With Rackspace
Products and Releases  |  3/6/2014  | 
Rackspace signed on with TraceSecurity as a referral partner last December
New Technique Targets C Code To Spot, Contain Malware Attacks
Products and Releases  |  3/5/2014  | 
Practical Root Exploit Containment tool refines anomaly detection
Belkin Secures Computing Enviornment With Webcam Adapter, USB Peripheral Switch
Products and Releases  |  3/5/2014  | 
New products help mitigate cyberthreats and improve network safety for government agencies, financial institutions, and others
Bromium Labs Finds YouTube Ads Serving Malware
Products and Releases  |  3/5/2014  | 
Team discovers classic drive-by download attack on YouTube infecting users by exploiting client software vulnerabilities
InformationWeek And Dark Reading Present SECURITY
Products and Releases  |  3/5/2014  | 
Half-day event to address new, sophisticated attacks being launched against enterprises
Informatica And Imperva Partner To Deliver Layered Database Privacy And Security
Products and Releases  |  3/5/2014  | 
Imperva will resell Informatica's data masking technology
Identity Finder, Verdasys Team
Products and Releases  |  3/5/2014  | 
Companies to integrate Identity Finder's Sensitive Data Manager enterprise solution with Verdasys' Digital Guardian and Managed Service for Information Protection offering
Security Processor Increases Data Center Security
Products and Releases  |  3/4/2014  | 
Freescale announces support from Silicom and Green Hills Software for its C29x crypto coprocessor
BlackBerry Introduces New Products And Services
Products and Releases  |  3/4/2014  | 
Announcements are part of BlackBerry’s ongoing strategy to stabilize the company and restore customer confidence
Entrust Integrates Biometric Fingerprint Authentication
Products and Releases  |  3/4/2014  | 
Entrust IdentityGuard 10.2 Feature Pack 1 will include 3M Cogent biometric fingerprint capture and verification technology
Cisco And NineSigma Announce $300,000 Grand Challenge To Secure Internet Of Things
Products and Releases  |  3/4/2014  | 
Cisco is seeking solutions for malware defense, security credential management, and privacy protection


COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.