Products and Releases

Content posted in April 2011
Page 1 / 2   >   >>
IronKey: U.K Organisations Fearful Of Organized Cybercrime
Products and Releases  |  4/29/2011  | 
30 percent suffered one or more attacks in the past 12 months resulting in theft of data or money
Dasient Names Harnish Patel Vice President Of Sales
Products and Releases  |  4/29/2011  | 
Harnish comes to Dasient from McAfee
Experian, Symantec Collaborate In ID Proofing And Authentication Technology
Products and Releases  |  4/28/2011  | 
Combined solution supports National Institute of Standards and Technology requirements
Voltage Rolls Out Page-Integrated Encryption For Protecting Credit Card Numbers
Products and Releases  |  4/28/2011  | 
PIE is particularly useful for e-commerce and other cloud-based applications that use confidential personal information
Apple Responds To iPhone Location Data-Gathering
Products and Releases  |  4/27/2011  | 
Apple answers 10 questions
FireHost Introduces Secure Cloud Hosting With PCI 2.0 Compliance
Products and Releases  |  4/26/2011  | 
Secure Cloud Hosting includes same level of protection as FireHost brand
73.7% Admit Email Compliance Violations
Products and Releases  |  4/26/2011  | 
Enterprises are not effectively mitigating email risk or educating employees on acceptable-use policies, according to VaporStream study
IronKey Announces Trusted Access For Banking v2.7
Products and Releases  |  4/26/2011  | 
Update extends IronKey’s keylogging protection
Symantec Announces April 2011 MessageLabs Intelligence Report
Products and Releases  |  4/26/2011  | 
Targeted attacks increase in intensity rising to 85 per day while global spam continues to fall
PhoneSheriff Allows Parents To Control Child Phone Activities And Track GPS Locations
Products and Releases  |  4/25/2011  | 
Parental control service works with iPhone, Android, BlackBerry, and Windows smartphones
Awareness Technologies Corporate Security Advisory: Seven Employee Monitoring Tips For Small Businesses
Products and Releases  |  4/25/2011  | 
Many small businesses do not have the time or resources to develop and enforce effective policies
Citi's Global Transaction Services Achieves PIV-I Cross-Certification With CertiPath
Products and Releases  |  4/25/2011  | 
Citi is the first company to be cross-certified by CertiPath to PIV-I
Managing Your Company's Cyber Risk: Antivirus Software And Endpoint Protection
Products and Releases  |  4/25/2011  | 
Symantec Endpoint Protection 12.1 is designed to stop mutating threats without slowing you down
HITRUST Outlines Plans to Support Healthcare Industry in 2011 and Beyond
Products and Releases  |  4/21/2011  | 
Health Information Trust Alliances identified a number of key areas, including cloud computing, data protection, health information exchanges (HIEs), mobile devices and authentication management, that it will focus on in 2011
Cloud Security Alliance Partners With ISO/IEC
Products and Releases  |  4/21/2011  | 
Cloud Security Alliance will have a key role in the development of cloud security and privacy standards under ISO/IEC
Michigan Woman Pleads Guilty To Selling More Than $400,000 In Counterfeit Business Software
Products and Releases  |  4/20/2011  | 
Pirated business software owned by several companies, including Microsoft, Adobe, Intuit and Symantec
FireMon Acquires Saperix Technologies
Products and Releases  |  4/20/2011  | 
FireMon expands security operations solution with patented risk analysis technology developed at MIT Lincoln Laboratory
Forum Systems Delivers Unified Content Firewall
Products and Releases  |  4/20/2011  | 
Next generation of flagship XML Gateway for faster, more powerful and seamless Web experience
Norton Survey Shows Royal Wedding Crowds Spilling Onto Cyber Streets
Products and Releases  |  4/18/2011  | 
Wedding bells for happy couple may mean warning bells for users
Norton Internet Security And Norton AntiVirus 2012 Public Betas Now Available
Products and Releases  |  4/15/2011  | 
Betas include key security enhancements
Fortinet: Torpig Botnet Re-Emerges
Products and Releases  |  4/15/2011  | 
Botnet accounting for 30 percent of new botnet activity
F5 Security Solutions Help Deliver DNS Security For Newly Signed .com Domain
Products and Releases  |  4/15/2011  | 
BIG-IP solutions provide a central point of control for DNSSEC based on trusted, signed query responses
U.S. Commerce Secretary, Senior White House Officials to Unveil Administration's National Strategy For Trusted Identities In Cyberspace
Products and Releases  |  4/14/2011  | 
Strategy lays out vision for a more secure online environment, led by private-sector technology innovations
New Software Creates Privacy Mode For The Android
Products and Releases  |  4/13/2011  | 
TISSA creates privacy setting manager that allows users to customize the level of information each smartphone application can access
Symantec Rolls Out New Messaging Gateway
Products and Releases  |  4/13/2011  | 
Solution blocks more than 99 percent of spam while integrating with DLP and encryption technologies to protect outbound messages
TrustDefender Launches New Security And Fraud Risk Management Solutions
Products and Releases  |  4/13/2011  | 
New products enable organizations to reduce the risk of dealing with online fraud
GigaTrust Brings Enterprise Rights Management To Apple's iPhone And iPad
Products and Releases  |  4/13/2011  | 
GigaTrust extends Microsoft AD RMS to rights-enable the iOS platform
AppSec And Securosis Team Up To Provide Comprehensive Guide For Database Security Programs
Products and Releases  |  4/13/2011  | 
Guide provides insight into all common database security tasks
Survey: Half Of Companies Can't Manage Risks Of Their IP-Connected Devices
Products and Releases  |  4/12/2011  | 
In general, companies know they aren’t prepared to handle device security breaches, according to Mocana study
CSIdentity Corporation Acquires IdentityTruth
Products and Releases  |  4/12/2011  | 
IdentityTruth's proprietary system constantly receives and analyzes data from multiple sources to build a complete identity profile for an individual
Email-Borne Malware Jumps 400% After Rustock Takedown, Says Commtouch Quarterly Report
Products and Releases  |  4/12/2011  | 
The first three months of 2011 were witness to a range of varied attempts to distribute malware, according to quarterly Internet Threats Trend Report
DataMotion Releases Groundbreaking Mobile Email Encryption
Products and Releases  |  4/12/2011  | 
SecureMail now integrates natively with all popular smartphone email clients
Verdasys Announces New Funding
Products and Releases  |  4/12/2011  | 
Investment will enable Verdasys to expand the Digital Guardian Platform into mobile devices and cloud security
DOJ: $1.4 Million Money Laundering Case Yields Guilty Plea, Another Suspect
Products and Releases  |  4/11/2011  | 
Georgi Vasilev Pletnyov faces a maximum sentence of 20 years in prison
Alert Logic Secures $12.6M Series E Funding
Products and Releases  |  4/11/2011  | 
Round is being led by investors Updata Partners, Covera Ventures, DFJ Mercury and Access Venture Partners
The Open Group Releases Maturity Model For Information Security Management
Products and Releases  |  4/11/2011  | 
O-ISM3 is compatible with other ISM industry standards, such as the ISO2700x series
TrustWave Teams With Tucows, Launches QuickTrust SSL
Products and Releases  |  4/7/2011  | 
Trustwave SSL offerings now available through Tucows’ OpenSRS
Android, Facebook And The Anonymous Hacks -- Most Serious Cybercrime Issues of Q1 2011
Products and Releases  |  4/7/2011  | 
First PandaLabs Quarterly Report of 2011 shows intense virus activity
Yubico And ForgeRock Partner To Provide Secure And Open Source Cloud Single Sign-On
Products and Releases  |  4/7/2011  | 
YubiKey is now supported in ForgeRock OpenAM
LogRhythm Raises $10M In Funding
Products and Releases  |  4/7/2011  | 
Company has tripled its customer base and revenue over the past two years
Neustar Launches SiteProtect For DDoS Protection
Products and Releases  |  4/7/2011  | 
SiteProtect allows customers’ Web infrastructure to operate normally under attack
MSPAlliance Establishes New Cloud, MSP Certification Standard
Products and Releases  |  4/7/2011  | 
Unified Certification Standard provides two levels of certification
Better Business Bureau Warns Of First Phishing Attacks In Wake Of Epsilon Breach
Products and Releases  |  4/6/2011  | 
Banks, credit-card issuers warn of email breach
Banking Department Warns Consumers about Email 'Phishing' Scams After Security Breaches At Epsilon And RSA
Products and Releases  |  4/5/2011  | 
Pennsylvania consumers warned to guard against possible financial scams involving their email accounts
PandaLabs Q1 Report: China, Thailand And Taiwan World's Most Infected Countries
Products and Releases  |  4/5/2011  | 
New threats surge 16 percent quarter over quarter to more than 73,000 new strains each day
ModSecurity WAF Gets New Features
Products and Releases  |  4/4/2011  | 
ModSecurity is a free, open-source web application firewall engine for Apache
Data Breach Mistakes Feared More Than Hackers By Compliance Professionals
Products and Releases  |  4/4/2011  | 
Fully 61% believed that an accidental breach by an employee was very or somewhat likely
NEI Awarded U.S. Patent For "Digital Fingerprinting" Software
Products and Releases  |  4/4/2011  | 
Tech validates software updates for physical and virtual servers and cloud-based application platforms
Videos, Installers, KeyGens, And Social Media Most Popular Attack Bait
Products and Releases  |  4/1/2011  | 
The most frequently blocked website in Q1 2011 was a Brazilian site offering a video of the Japanese tsunami disaster
2010 Threats Year In Review: Toolkits Dominated The Cybercriminal Scene
Products and Releases  |  4/1/2011  | 
The rise of toolkits turned nontechies into hackers
Page 1 / 2   >   >>


New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11415
PUBLISHED: 2018-05-24
SAP Internet Transaction Server (ITS) 6200.X.X has Reflected Cross Site Scripting (XSS) via certain wgate URIs. NOTE: the vendor has reportedly indicated that there will not be any further releases of this product.
CVE-2018-11412
PUBLISHED: 2018-05-24
In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode.
CVE-2018-11413
PUBLISHED: 2018-05-24
An issue was discovered in BearAdmin 0.5. Remote attackers can download arbitrary files via /admin/databack/download.html?name= directory traversal sequences, as demonstrated by name=../application/database.php to read the MySQL credentials in the configuration.
CVE-2018-11414
PUBLISHED: 2018-05-24
An issue was discovered in BearAdmin 0.5. There is admin/admin_log/index.html?user_id= SQL injection because admin\controller\AdminLog.php constructs a MySQL query improperly.
CVE-2018-10593
PUBLISHED: 2018-05-24
A vulnerability in DB Manager version 3.0.1.0 and previous and PerformA version 3.0.0.0 and previous allows an authorized user with access to a privileged account on a BD Kiestra system (Kiestra TLA, Kiestra WCA, and InoqulA+ specimen processor) to issue SQL commands, which may result in data corrup...