Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2014
Fraudsters use BBC real news as bait to steal users' identity
Products and Releases  |  3/31/2014  | 
The URL takes you to the real BBC News website
BlackBerry Earns 'Full Operational Capability' with U.S. Department of Defense
Products and Releases  |  3/28/2014  | 
Validation completes DISAs certification process for BlackBerry 10 mobility management platform
Fortinet delivers FortiGate-VM on Amazon Web Services (AWS)
Products and Releases  |  3/28/2014  | 
FortiGate-VM on AWS to Help Customers Extend Enterprise Security Into Their Public Cloud Deployments
New USB Enforced Encryption Device for Mac OS
Products and Releases  |  3/28/2014  | 
Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices
FireEye Releases Comprehensive Analysis of 2013 Zero-day Attacks; Impact on Security Models
Products and Releases  |  3/27/2014  | 
New Research Paper Offers Insight into Industrys Leading Zero-day and Advanced Threat Detection Models
ThreatMetrix Secures $20 Million Series E Financing
Products and Releases  |  3/27/2014  | 
Company Reveals Aggressive Plans to Expand the Largest Shared Global Identity Network
Is Your Tax Return Being Targeted by Cybercriminals?
Products and Releases  |  3/26/2014  | 
With tax season underway, iovation cautions businesses and taxpayers to safeguard personal data
BlackBerry Advances Security of its Multi-Platform Mobility Portfolio with New Cryptography Certification
Products and Releases  |  3/26/2014  | 
FIPS 140-2 validation granted for Secure Work Space for iOS and Android
SANS Report Shows Jump In Attacks On Industrial Control Systems
Products and Releases  |  3/26/2014  | 
More Breaches Identified; Vulnerability Detection Limited; Shared Responsibility
SANS Report Shows Jump In Attacks On Industrial Control Systems
Products and Releases  |  3/26/2014  | 
More Breaches Identified; Vulnerability Detection Limited; Shared Responsibility
NSFOCUS DDoS Threat Report 2013: Nearly 28 Attacks Per Hour
Products and Releases  |  3/26/2014  | 
'Hackernomics' drives smaller, shorter and repeated attacks for better efficiency
Liberty International Underwriters to Provide Network Activity Monitoring through BitSight Technologies for LIU Data Insure Policyholders
Products and Releases  |  3/26/2014  | 
Insurer partners with BitSight Technologies to deliver big data analysis capabilities to policyholders
Alert Logic Adds Capabilities To Enhance Hybrid IT Security
Products and Releases  |  3/25/2014  | 
Announces upgraded versions of its Alert Logic Threat Manager and Alert Logic Web Security Manager solutions
Synopsys Completes Coverity Acquisition
Products and Releases  |  3/25/2014  | 
Companies intend to improve software quality and help ensure mission-critical applications are built to withstand increasing security threats
Parallels Survey Of IT Professionals Finds Macs Moving Beyond BYOD Phenomenon, Now Considered For Broader Corporate Deployment
Products and Releases  |  3/25/2014  | 
Macs are in high demand, and those who already support them shared the top reasons why
Neurotechnology Announces Major Updates To Entire Biometric Product Line
Products and Releases  |  3/17/2014  | 
Latest product versions include algorithm improvements for functionality enhancement and higher recognition accuracy
NetIQ Unveils NetIQ MobileAccess
Products and Releases  |  3/17/2014  | 
Virtual appliance enables secure access from iOS or Android mobile devices
FireHost Names New CEO
Products and Releases  |  3/17/2014  | 
Founder and former CEO Chris Drake will be CTO
Adblock Plus Expands Anti-Tracking Privacy Tool
Products and Releases  |  3/17/2014  | 
EasyPrivacy filter blocks tracking resources, such as cookies, scripts, and tracking pixels
Lookout Appoints New CEO Jim Dolce
Products and Releases  |  3/17/2014  | 
Founder John Hering will become executive chairman and have a day-to-day role at Lookout
Finjan Holdings Subsidiary Files New Patent Infringement Lawsuit Against Sophos
Products and Releases  |  3/17/2014  | 
Alleges infringement of Finjan patents relating to endpoint, Web, and network security technologies
High-Bandwidth NTP Amplification DDoS Attacks Escalate 371 Percent in the Last 30 days
Products and Releases  |  3/12/2014  | 
Prolexic Issues High Alert DDoS Attack Threat Advisory
IT Security Pros Abandoning Traditional Security Measures In Favor Of SMS-Based Two-Factor Authentication
Products and Releases  |  3/12/2014  | 
Ponemon and Tyntec survey finds 68% believe username/passwords not enough
Latest Security Technology Market Research Study From 451 Research
Products and Releases  |  3/10/2014  | 
Information security 2013 budgets con­tinued a healthy multiyear run
New Data From PerspecSys Shows Without Security, Clouds Can't Reign
Products and Releases  |  3/10/2014  | 
Survey results from RSA Conference show companies are not being proactive enough to protect sensitive data in the cloud
MTN Government Launches Social Media Threat Intelligence Managed Service
Products and Releases  |  3/10/2014  | 
Solution identifies and analyzes malicious actors, threats, and targeted attacks against U.S. government leaders and agencies
HBGary Announces Advanced Endpoint Security, Incident Detection And Enhanced User Efficiency With Active Defense 1.4
Products and Releases  |  3/10/2014  | 
Active Defense 1.4 includes enhanced filtering, customized Web-based dashboards
Robert Anderson, Jr. Named To Lead FBI Criminal, Cyber, Response, And Services Branch
Products and Releases  |  3/10/2014  | 
He will be responsible for all criminal and cyber investigations worldwide
AlephCloud Gets Patent for Keeping Content Private from Cloud Providers
Products and Releases  |  3/8/2014  | 
Invention Enables Cloud Providers to Supply Encryption for Multi-Party Collaboration that only the Content Owner Controls
Wave Joins The FIDO Alliance
Products and Releases  |  3/7/2014  | 
FIDO specifications will support a full range of authentication technologies
CloudLock Announces Compliance For Google+
Products and Releases  |  3/7/2014  | 
CloudLock customers can now leverage one social networks while applying security and compliance policies to protect data
New AppRiver Survey: IT Security Pros Care More About Malware Than NSA Spying
Products and Releases  |  3/7/2014  | 
More than half of respondents report cybercrime from external sources as most problematic
FireEye Issues Secondary Public Offering
Products and Releases  |  3/7/2014  | 
Announcement follows IPO in September and $1 billion acquisition of Mandiant
IPR International Partners With AFORE To Offer Encryption As A Service (EaaS)
Products and Releases  |  3/6/2014  | 
Encryption solutions are available at the storage, virtual machine, file, and application levels
New IT Security Survey Results -- Top Reasons To Monitor Users
Products and Releases  |  3/6/2014  | 
BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology
TraceSecurity Announces Mutual Referral Partnership With Rackspace
Products and Releases  |  3/6/2014  | 
Rackspace signed on with TraceSecurity as a referral partner last December
New Technique Targets C Code To Spot, Contain Malware Attacks
Products and Releases  |  3/5/2014  | 
Practical Root Exploit Containment tool refines anomaly detection
Belkin Secures Computing Enviornment With Webcam Adapter, USB Peripheral Switch
Products and Releases  |  3/5/2014  | 
New products help mitigate cyberthreats and improve network safety for government agencies, financial institutions, and others
Bromium Labs Finds YouTube Ads Serving Malware
Products and Releases  |  3/5/2014  | 
Team discovers classic drive-by download attack on YouTube infecting users by exploiting client software vulnerabilities
InformationWeek And Dark Reading Present SECURITY
Products and Releases  |  3/5/2014  | 
Half-day event to address new, sophisticated attacks being launched against enterprises
Informatica And Imperva Partner To Deliver Layered Database Privacy And Security
Products and Releases  |  3/5/2014  | 
Imperva will resell Informatica's data masking technology
Identity Finder, Verdasys Team
Products and Releases  |  3/5/2014  | 
Companies to integrate Identity Finder's Sensitive Data Manager enterprise solution with Verdasys' Digital Guardian and Managed Service for Information Protection offering
Security Processor Increases Data Center Security
Products and Releases  |  3/4/2014  | 
Freescale announces support from Silicom and Green Hills Software for its C29x crypto coprocessor
BlackBerry Introduces New Products And Services
Products and Releases  |  3/4/2014  | 
Announcements are part of BlackBerry’s ongoing strategy to stabilize the company and restore customer confidence
Entrust Integrates Biometric Fingerprint Authentication
Products and Releases  |  3/4/2014  | 
Entrust IdentityGuard 10.2 Feature Pack 1 will include 3M Cogent biometric fingerprint capture and verification technology
Cisco And NineSigma Announce $300,000 Grand Challenge To Secure Internet Of Things
Products and Releases  |  3/4/2014  | 
Cisco is seeking solutions for malware defense, security credential management, and privacy protection

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file