Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2014
Fraudsters use BBC real news as bait to steal users' identity
Products and Releases  |  3/31/2014  | 
The URL takes you to the real BBC News website
BlackBerry Earns 'Full Operational Capability' with U.S. Department of Defense
Products and Releases  |  3/28/2014  | 
Validation completes DISAs certification process for BlackBerry 10 mobility management platform
Fortinet delivers FortiGate-VM on Amazon Web Services (AWS)
Products and Releases  |  3/28/2014  | 
FortiGate-VM on AWS to Help Customers Extend Enterprise Security Into Their Public Cloud Deployments
New USB Enforced Encryption Device for Mac OS
Products and Releases  |  3/28/2014  | 
Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices
FireEye Releases Comprehensive Analysis of 2013 Zero-day Attacks; Impact on Security Models
Products and Releases  |  3/27/2014  | 
New Research Paper Offers Insight into Industrys Leading Zero-day and Advanced Threat Detection Models
ThreatMetrix Secures $20 Million Series E Financing
Products and Releases  |  3/27/2014  | 
Company Reveals Aggressive Plans to Expand the Largest Shared Global Identity Network
Is Your Tax Return Being Targeted by Cybercriminals?
Products and Releases  |  3/26/2014  | 
With tax season underway, iovation cautions businesses and taxpayers to safeguard personal data
BlackBerry Advances Security of its Multi-Platform Mobility Portfolio with New Cryptography Certification
Products and Releases  |  3/26/2014  | 
FIPS 140-2 validation granted for Secure Work Space for iOS and Android
SANS Report Shows Jump In Attacks On Industrial Control Systems
Products and Releases  |  3/26/2014  | 
More Breaches Identified; Vulnerability Detection Limited; Shared Responsibility
SANS Report Shows Jump In Attacks On Industrial Control Systems
Products and Releases  |  3/26/2014  | 
More Breaches Identified; Vulnerability Detection Limited; Shared Responsibility
NSFOCUS DDoS Threat Report 2013: Nearly 28 Attacks Per Hour
Products and Releases  |  3/26/2014  | 
'Hackernomics' drives smaller, shorter and repeated attacks for better efficiency
Liberty International Underwriters to Provide Network Activity Monitoring through BitSight Technologies for LIU Data Insure Policyholders
Products and Releases  |  3/26/2014  | 
Insurer partners with BitSight Technologies to deliver big data analysis capabilities to policyholders
Alert Logic Adds Capabilities To Enhance Hybrid IT Security
Products and Releases  |  3/25/2014  | 
Announces upgraded versions of its Alert Logic Threat Manager and Alert Logic Web Security Manager solutions
Synopsys Completes Coverity Acquisition
Products and Releases  |  3/25/2014  | 
Companies intend to improve software quality and help ensure mission-critical applications are built to withstand increasing security threats
Parallels Survey Of IT Professionals Finds Macs Moving Beyond BYOD Phenomenon, Now Considered For Broader Corporate Deployment
Products and Releases  |  3/25/2014  | 
Macs are in high demand, and those who already support them shared the top reasons why
Neurotechnology Announces Major Updates To Entire Biometric Product Line
Products and Releases  |  3/17/2014  | 
Latest product versions include algorithm improvements for functionality enhancement and higher recognition accuracy
NetIQ Unveils NetIQ MobileAccess
Products and Releases  |  3/17/2014  | 
Virtual appliance enables secure access from iOS or Android mobile devices
FireHost Names New CEO
Products and Releases  |  3/17/2014  | 
Founder and former CEO Chris Drake will be CTO
Adblock Plus Expands Anti-Tracking Privacy Tool
Products and Releases  |  3/17/2014  | 
EasyPrivacy filter blocks tracking resources, such as cookies, scripts, and tracking pixels
Lookout Appoints New CEO Jim Dolce
Products and Releases  |  3/17/2014  | 
Founder John Hering will become executive chairman and have a day-to-day role at Lookout
Finjan Holdings Subsidiary Files New Patent Infringement Lawsuit Against Sophos
Products and Releases  |  3/17/2014  | 
Alleges infringement of Finjan patents relating to endpoint, Web, and network security technologies
High-Bandwidth NTP Amplification DDoS Attacks Escalate 371 Percent in the Last 30 days
Products and Releases  |  3/12/2014  | 
Prolexic Issues High Alert DDoS Attack Threat Advisory
IT Security Pros Abandoning Traditional Security Measures In Favor Of SMS-Based Two-Factor Authentication
Products and Releases  |  3/12/2014  | 
Ponemon and Tyntec survey finds 68% believe username/passwords not enough
Latest Security Technology Market Research Study From 451 Research
Products and Releases  |  3/10/2014  | 
Information security 2013 budgets con­tinued a healthy multiyear run
New Data From PerspecSys Shows Without Security, Clouds Can't Reign
Products and Releases  |  3/10/2014  | 
Survey results from RSA Conference show companies are not being proactive enough to protect sensitive data in the cloud
MTN Government Launches Social Media Threat Intelligence Managed Service
Products and Releases  |  3/10/2014  | 
Solution identifies and analyzes malicious actors, threats, and targeted attacks against U.S. government leaders and agencies
HBGary Announces Advanced Endpoint Security, Incident Detection And Enhanced User Efficiency With Active Defense 1.4
Products and Releases  |  3/10/2014  | 
Active Defense 1.4 includes enhanced filtering, customized Web-based dashboards
Robert Anderson, Jr. Named To Lead FBI Criminal, Cyber, Response, And Services Branch
Products and Releases  |  3/10/2014  | 
He will be responsible for all criminal and cyber investigations worldwide
AlephCloud Gets Patent for Keeping Content Private from Cloud Providers
Products and Releases  |  3/8/2014  | 
Invention Enables Cloud Providers to Supply Encryption for Multi-Party Collaboration that only the Content Owner Controls
Wave Joins The FIDO Alliance
Products and Releases  |  3/7/2014  | 
FIDO specifications will support a full range of authentication technologies
CloudLock Announces Compliance For Google+
Products and Releases  |  3/7/2014  | 
CloudLock customers can now leverage one social networks while applying security and compliance policies to protect data
New AppRiver Survey: IT Security Pros Care More About Malware Than NSA Spying
Products and Releases  |  3/7/2014  | 
More than half of respondents report cybercrime from external sources as most problematic
FireEye Issues Secondary Public Offering
Products and Releases  |  3/7/2014  | 
Announcement follows IPO in September and $1 billion acquisition of Mandiant
IPR International Partners With AFORE To Offer Encryption As A Service (EaaS)
Products and Releases  |  3/6/2014  | 
Encryption solutions are available at the storage, virtual machine, file, and application levels
New IT Security Survey Results -- Top Reasons To Monitor Users
Products and Releases  |  3/6/2014  | 
BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology
TraceSecurity Announces Mutual Referral Partnership With Rackspace
Products and Releases  |  3/6/2014  | 
Rackspace signed on with TraceSecurity as a referral partner last December
New Technique Targets C Code To Spot, Contain Malware Attacks
Products and Releases  |  3/5/2014  | 
Practical Root Exploit Containment tool refines anomaly detection
Belkin Secures Computing Enviornment With Webcam Adapter, USB Peripheral Switch
Products and Releases  |  3/5/2014  | 
New products help mitigate cyberthreats and improve network safety for government agencies, financial institutions, and others
Bromium Labs Finds YouTube Ads Serving Malware
Products and Releases  |  3/5/2014  | 
Team discovers classic drive-by download attack on YouTube infecting users by exploiting client software vulnerabilities
InformationWeek And Dark Reading Present SECURITY
Products and Releases  |  3/5/2014  | 
Half-day event to address new, sophisticated attacks being launched against enterprises
Informatica And Imperva Partner To Deliver Layered Database Privacy And Security
Products and Releases  |  3/5/2014  | 
Imperva will resell Informatica's data masking technology
Identity Finder, Verdasys Team
Products and Releases  |  3/5/2014  | 
Companies to integrate Identity Finder's Sensitive Data Manager enterprise solution with Verdasys' Digital Guardian and Managed Service for Information Protection offering
Security Processor Increases Data Center Security
Products and Releases  |  3/4/2014  | 
Freescale announces support from Silicom and Green Hills Software for its C29x crypto coprocessor
BlackBerry Introduces New Products And Services
Products and Releases  |  3/4/2014  | 
Announcements are part of BlackBerry’s ongoing strategy to stabilize the company and restore customer confidence
Entrust Integrates Biometric Fingerprint Authentication
Products and Releases  |  3/4/2014  | 
Entrust IdentityGuard 10.2 Feature Pack 1 will include 3M Cogent biometric fingerprint capture and verification technology
Cisco And NineSigma Announce $300,000 Grand Challenge To Secure Internet Of Things
Products and Releases  |  3/4/2014  | 
Cisco is seeking solutions for malware defense, security credential management, and privacy protection

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.