Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2012
Page 1 / 3   >   >>
ACTi And Twonky Directory Traversal Vulnerabilities Disclosed By Digital Defense
Products and Releases  |  4/30/2012  | 
DDI has disclosed multiple disclosures in recent months
Blackbird International Corporation Announces Its Acquisition of Insight ID
Products and Releases  |  4/30/2012  | 
Insight ID is a real-time authentication service
Sourcefire Announces First Quarter 2012 Financial Results
Products and Releases  |  4/30/2012  | 
Company increased commercial U.S. revenue 28 percent compared to the same quarter last year
Akamai Releases Fourth Quarter 2011 'State Of The Internet' Report
Products and Releases  |  4/30/2012  | 
China top source of observed attack traffic
Symantec Releases Internet Security Threat Report, Volume 17
Products and Releases  |  4/30/2012  | 
Number of malicious attacks skyrocketed by 81 percent
Gigamon Partners With ForeScout
Products and Releases  |  4/27/2012  | 
Companies to provide an integrated set of network management and visibility solutions
ISSA-LA Offers Free Registration Program For NonProfits
Products and Releases  |  4/27/2012  | 
Registration is open to anyone interested in learning more about information security
Shape Security Closes $6 Million Series A Funding Round
Products and Releases  |  4/26/2012  | 
Round led by Kleiner Perkins Caufield & Byers and Google executive chairman Eric Schmidt's TomorrowVentures
Dome9 Security Introduces One-Click Cloud Server Secure Access
Products and Releases  |  4/26/2012  | 
Browser-based application enables one-click secure access to any server and any cloud for Google Chrome users
Privacy Rights Groups Voice Opposition To CISPA
Products and Releases  |  4/26/2012  | 
Cyber Intelligence Sharing and Protection Act "explicitly supersedes all standing online privacy protections," opponents say
Black Hat Expands Content Review Board
Products and Releases  |  4/26/2012  | 
Chris Rohlf and Chris Wysopal join board
PayPal Surpassed By Taobao As Most Phished Brand
Products and Releases  |  4/26/2012  | 
Taobao.com is one of China's largest e-commerce sites
Trustworthy Internet Movement Picks SSL Implementation And Governance As First Initiative
Products and Releases  |  4/26/2012  | 
TIM also launched SSL Pulse, an index that tracks the progress of how well SSL is implemented
Metaforic Announces Protection For Android Applications
Products and Releases  |  4/25/2012  | 
Android application developers can harden their applications to minimize hacking vulnerability
Lumension Endpoint Security Suite Integrates Cloud-Based Integrity Service
Products and Releases  |  4/25/2012  | 
Service will now be available within the Lumension Endpoint Management and Security Suite management console
Solera Networks Takes Security Out Of The Box
Products and Releases  |  4/25/2012  | 
Rolls out new version of DeepSeer Software
Norton And Facebook Partner To Make Web Safer
Products and Releases  |  4/25/2012  | 
Partnership brings Norton protection to Facebook members
SSH Communications Security Unveils SSH User Key Management Solution
Products and Releases  |  4/25/2012  | 
Solution is first new extension of its SSH Information Integrity Platform
BT Assure Adds Intelligence And Innovation For The New Security Reality
Products and Releases  |  4/25/2012  | 
Exclusive BT research shows opportunity for organizations to "rethink the risk"
ValidEdge Unveils Portable Malware Intelligence System
Products and Releases  |  4/25/2012  | 
ValidEdge MISbook 2300 can analyze up to 1,000 malware samples per day in a fully functional laptop
European Online Fraud Increases 60%
Products and Releases  |  4/25/2012  | 
iovation also announces launch of European data center
Trend Micro Announces Partnership With Facebook Offering Users Protection For Their Digital Life
Products and Releases  |  4/25/2012  | 
Trend Micro Smart Protection Network uses cloud technology, threat correlation, and a global network of threat intelligence sensors to stop malware and Web threats
IBM Announces New Threat Analytics To Help Organizations Better Identify Hidden Security Attacks
Products and Releases  |  4/25/2012  | 
QRadar Network Anomaly Detection appliance analyzes complex network activity in real-time
Courion Leverages NaviSite's Enterprise Cloud To Deliver Identity And Access Management Software-As-A-Service
Products and Releases  |  4/24/2012  | 
Courion selected NaviSite for its global footprint
New Vormetric Release Uses Chips To Make Enterprise Encryption Invisible
Products and Releases  |  4/24/2012  | 
Vormetric Encryption V5 includes scalability enhancements
Dirty Disks Raise New Questions About Cloud Security
Products and Releases  |  4/24/2012  | 
Context Information Security IDs potentially significant flaws in the implementation of cloud infrastructure services
NetDNA And GlobalSign Bring Instant Provisioning To Web Security With EdgeSSLT Service
Products and Releases  |  4/24/2012  | 
EdgeSSL is a one-stop SSL Certificate solution for the NetDNA content delivery network
Websense Reports Record First Quarter Billings On Strong TRITON Performance
Products and Releases  |  4/24/2012  | 
First quarter revenues of $89.5 million, up 1 percent year-over-year
LANDesk Acquires Data Analytics Company
Products and Releases  |  4/24/2012  | 
Managed Planet marks LANDesk's fifth acquisition
Arbor Announces New Version Of Peakflow SP
Products and Releases  |  4/24/2012  | 
New features within the platform include ATLAS Intelligence Feed
Bocada Announces Physical And Virtual Data Protection Management In Single Solution
Products and Releases  |  4/24/2012  | 
Bocada vpConnect correlates data protection activities across environments
SureCloud Launches Unified Compliance Platform
Products and Releases  |  4/24/2012  | 
SaaS solution helps midmarket organizations automate and simplify security and compliance processes
CORE Security Announces CORE Insight Enterprise 2.0
Products and Releases  |  4/24/2012  | 
With version 2.0, CORE Insight now offers a comprehensive set of vulnerability management capabilities
Air Force Wins NSA's 12th Annual Test Of Cyber Defense
Products and Releases  |  4/24/2012  | 
Marks third win since annual competition began in 2001
McAfee Announces Next-Generation Situational And Risk-Aware SIEM
Products and Releases  |  4/24/2012  | 
McAfee Enterprise Security Manager has a scalable database that was built to handle big security data
One In Five Macs Harbors Malware, Sophos Research Reveals
Products and Releases  |  4/24/2012  | 
Both Windows and Mac threats were discovered
New Norton Secured Seal Trust Mark Unveiled
Products and Releases  |  4/23/2012  | 
Symantec unites the power of the VeriSign and Norton
VidSys And Activu Partner to Enhance Situational Awareness And Collaboration For Public Sector
Products and Releases  |  4/23/2012  | 
Combination of VidSys PSIM software with Activu’s IP-based visualization and collaboration solution provides an open standards, network-based solution
DISA Selects HP To Enhance Assessment Of Networks For Vulnerabilities
Products and Releases  |  4/23/2012  | 
Program will provide analytics to enable the assessment of DoD enterprise networks and connected IT systems
VASCO Launches MYDIGIPASS.COM
Products and Releases  |  4/23/2012  | 
Gives consumers access to convenient and secure login services to various Web applications
Lookout Announces Partnership With Deutsche Telekom
Products and Releases  |  4/23/2012  | 
Partnership focuses on distribution and joint innovation
Sophos Publishes 'Dirty Dozen' Report -- India Takes The Spam Crown
Products and Releases  |  4/23/2012  | 
Malicious spam and phishing increases, while overall volumes dip
National Collegiate Cyber Defense Competition Champion Crowned
Products and Releases  |  4/23/2012  | 
Top three finalists from University of Washington, U. S. Air Force Academy, and Texas A&M University
61% Of IT Security Professionals Are Concerned About Attacks From Anonymous And Hacktivists
Products and Releases  |  4/23/2012  | 
Bit9 survey also showed that IT executives are most concerned about malware and spear phishing attacks
New Survey: 70% Of Orgs Don't Take Data Protection Seriously
Products and Releases  |  4/20/2012  | 
Majority of organizations in this study are failing to comply with SOX, others, Varonis study shows
10 Things To Consider Before Purchasing Cyber Insurance
Products and Releases  |  4/20/2012  | 
ID Experts has created a free checklist to help guide companies
Spy Software For Tablets Released
Products and Releases  |  4/20/2012  | 
Retina-X Studios unveils PeekTab multiplatform monitoring software for tablets
NCP Engineering Debuts Universal VPN Client For Android 4.0
Products and Releases  |  4/20/2012  | 
Now available for free download in the Google Play store
Certes Networks Releases Virtual Security Appliance
Products and Releases  |  4/20/2012  | 
Encryption solution protects network traffic inside IaaS clouds and between customer locations
Faronics Announces New Anti-Executable Product
Products and Releases  |  4/20/2012  | 
Faronics Anti-Executable 5.0 boosts defense against advanced persistent threats, sophisticated malware and zero-day attacks
Page 1 / 3   >   >>


Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...