Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2014
Fraudsters use BBC real news as bait to steal users' identity
Products and Releases  |  3/31/2014  | 
The URL takes you to the real BBC News website
BlackBerry Earns 'Full Operational Capability' with U.S. Department of Defense
Products and Releases  |  3/28/2014  | 
Validation completes DISAs certification process for BlackBerry 10 mobility management platform
Fortinet delivers FortiGate-VM on Amazon Web Services (AWS)
Products and Releases  |  3/28/2014  | 
FortiGate-VM on AWS to Help Customers Extend Enterprise Security Into Their Public Cloud Deployments
New USB Enforced Encryption Device for Mac OS
Products and Releases  |  3/28/2014  | 
Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices
FireEye Releases Comprehensive Analysis of 2013 Zero-day Attacks; Impact on Security Models
Products and Releases  |  3/27/2014  | 
New Research Paper Offers Insight into Industrys Leading Zero-day and Advanced Threat Detection Models
ThreatMetrix Secures $20 Million Series E Financing
Products and Releases  |  3/27/2014  | 
Company Reveals Aggressive Plans to Expand the Largest Shared Global Identity Network
Is Your Tax Return Being Targeted by Cybercriminals?
Products and Releases  |  3/26/2014  | 
With tax season underway, iovation cautions businesses and taxpayers to safeguard personal data
BlackBerry Advances Security of its Multi-Platform Mobility Portfolio with New Cryptography Certification
Products and Releases  |  3/26/2014  | 
FIPS 140-2 validation granted for Secure Work Space for iOS and Android
SANS Report Shows Jump In Attacks On Industrial Control Systems
Products and Releases  |  3/26/2014  | 
More Breaches Identified; Vulnerability Detection Limited; Shared Responsibility
SANS Report Shows Jump In Attacks On Industrial Control Systems
Products and Releases  |  3/26/2014  | 
More Breaches Identified; Vulnerability Detection Limited; Shared Responsibility
NSFOCUS DDoS Threat Report 2013: Nearly 28 Attacks Per Hour
Products and Releases  |  3/26/2014  | 
'Hackernomics' drives smaller, shorter and repeated attacks for better efficiency
Liberty International Underwriters to Provide Network Activity Monitoring through BitSight Technologies for LIU Data Insure Policyholders
Products and Releases  |  3/26/2014  | 
Insurer partners with BitSight Technologies to deliver big data analysis capabilities to policyholders
Alert Logic Adds Capabilities To Enhance Hybrid IT Security
Products and Releases  |  3/25/2014  | 
Announces upgraded versions of its Alert Logic Threat Manager and Alert Logic Web Security Manager solutions
Synopsys Completes Coverity Acquisition
Products and Releases  |  3/25/2014  | 
Companies intend to improve software quality and help ensure mission-critical applications are built to withstand increasing security threats
Parallels Survey Of IT Professionals Finds Macs Moving Beyond BYOD Phenomenon, Now Considered For Broader Corporate Deployment
Products and Releases  |  3/25/2014  | 
Macs are in high demand, and those who already support them shared the top reasons why
Neurotechnology Announces Major Updates To Entire Biometric Product Line
Products and Releases  |  3/17/2014  | 
Latest product versions include algorithm improvements for functionality enhancement and higher recognition accuracy
NetIQ Unveils NetIQ MobileAccess
Products and Releases  |  3/17/2014  | 
Virtual appliance enables secure access from iOS or Android mobile devices
FireHost Names New CEO
Products and Releases  |  3/17/2014  | 
Founder and former CEO Chris Drake will be CTO
Adblock Plus Expands Anti-Tracking Privacy Tool
Products and Releases  |  3/17/2014  | 
EasyPrivacy filter blocks tracking resources, such as cookies, scripts, and tracking pixels
Lookout Appoints New CEO Jim Dolce
Products and Releases  |  3/17/2014  | 
Founder John Hering will become executive chairman and have a day-to-day role at Lookout
Finjan Holdings Subsidiary Files New Patent Infringement Lawsuit Against Sophos
Products and Releases  |  3/17/2014  | 
Alleges infringement of Finjan patents relating to endpoint, Web, and network security technologies
High-Bandwidth NTP Amplification DDoS Attacks Escalate 371 Percent in the Last 30 days
Products and Releases  |  3/12/2014  | 
Prolexic Issues High Alert DDoS Attack Threat Advisory
IT Security Pros Abandoning Traditional Security Measures In Favor Of SMS-Based Two-Factor Authentication
Products and Releases  |  3/12/2014  | 
Ponemon and Tyntec survey finds 68% believe username/passwords not enough
Latest Security Technology Market Research Study From 451 Research
Products and Releases  |  3/10/2014  | 
Information security 2013 budgets con­tinued a healthy multiyear run
New Data From PerspecSys Shows Without Security, Clouds Can't Reign
Products and Releases  |  3/10/2014  | 
Survey results from RSA Conference show companies are not being proactive enough to protect sensitive data in the cloud
MTN Government Launches Social Media Threat Intelligence Managed Service
Products and Releases  |  3/10/2014  | 
Solution identifies and analyzes malicious actors, threats, and targeted attacks against U.S. government leaders and agencies
HBGary Announces Advanced Endpoint Security, Incident Detection And Enhanced User Efficiency With Active Defense 1.4
Products and Releases  |  3/10/2014  | 
Active Defense 1.4 includes enhanced filtering, customized Web-based dashboards
Robert Anderson, Jr. Named To Lead FBI Criminal, Cyber, Response, And Services Branch
Products and Releases  |  3/10/2014  | 
He will be responsible for all criminal and cyber investigations worldwide
AlephCloud Gets Patent for Keeping Content Private from Cloud Providers
Products and Releases  |  3/8/2014  | 
Invention Enables Cloud Providers to Supply Encryption for Multi-Party Collaboration that only the Content Owner Controls
Wave Joins The FIDO Alliance
Products and Releases  |  3/7/2014  | 
FIDO specifications will support a full range of authentication technologies
CloudLock Announces Compliance For Google+
Products and Releases  |  3/7/2014  | 
CloudLock customers can now leverage one social networks while applying security and compliance policies to protect data
New AppRiver Survey: IT Security Pros Care More About Malware Than NSA Spying
Products and Releases  |  3/7/2014  | 
More than half of respondents report cybercrime from external sources as most problematic
FireEye Issues Secondary Public Offering
Products and Releases  |  3/7/2014  | 
Announcement follows IPO in September and $1 billion acquisition of Mandiant
IPR International Partners With AFORE To Offer Encryption As A Service (EaaS)
Products and Releases  |  3/6/2014  | 
Encryption solutions are available at the storage, virtual machine, file, and application levels
New IT Security Survey Results -- Top Reasons To Monitor Users
Products and Releases  |  3/6/2014  | 
BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology
TraceSecurity Announces Mutual Referral Partnership With Rackspace
Products and Releases  |  3/6/2014  | 
Rackspace signed on with TraceSecurity as a referral partner last December
New Technique Targets C Code To Spot, Contain Malware Attacks
Products and Releases  |  3/5/2014  | 
Practical Root Exploit Containment tool refines anomaly detection
Belkin Secures Computing Enviornment With Webcam Adapter, USB Peripheral Switch
Products and Releases  |  3/5/2014  | 
New products help mitigate cyberthreats and improve network safety for government agencies, financial institutions, and others
Bromium Labs Finds YouTube Ads Serving Malware
Products and Releases  |  3/5/2014  | 
Team discovers classic drive-by download attack on YouTube infecting users by exploiting client software vulnerabilities
InformationWeek And Dark Reading Present SECURITY
Products and Releases  |  3/5/2014  | 
Half-day event to address new, sophisticated attacks being launched against enterprises
Informatica And Imperva Partner To Deliver Layered Database Privacy And Security
Products and Releases  |  3/5/2014  | 
Imperva will resell Informatica's data masking technology
Identity Finder, Verdasys Team
Products and Releases  |  3/5/2014  | 
Companies to integrate Identity Finder's Sensitive Data Manager enterprise solution with Verdasys' Digital Guardian and Managed Service for Information Protection offering
Security Processor Increases Data Center Security
Products and Releases  |  3/4/2014  | 
Freescale announces support from Silicom and Green Hills Software for its C29x crypto coprocessor
BlackBerry Introduces New Products And Services
Products and Releases  |  3/4/2014  | 
Announcements are part of BlackBerry’s ongoing strategy to stabilize the company and restore customer confidence
Entrust Integrates Biometric Fingerprint Authentication
Products and Releases  |  3/4/2014  | 
Entrust IdentityGuard 10.2 Feature Pack 1 will include 3M Cogent biometric fingerprint capture and verification technology
Cisco And NineSigma Announce $300,000 Grand Challenge To Secure Internet Of Things
Products and Releases  |  3/4/2014  | 
Cisco is seeking solutions for malware defense, security credential management, and privacy protection


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...