Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2013
Page 1 / 3   >   >>
Exploit Devs At Risk: The Nuclear Scientists Of The Next Decade?
Products and Releases  |  4/30/2013  | 
Will a nations exploit developers become the potential targets of state-sponsored assassinations in the future, much like the nuclear scientists of the past century?
Arxan Announces Mobile Application Integrity Protection For IBM MobileFirst Customers
Products and Releases  |  4/30/2013  | 
Introduces Arxan Mobile Application Integrity Protection for IBM Worklight Apps
Employee Negligence Makes U.K. 'Sitting Duck' For Cybercrime
Products and Releases  |  4/30/2013  | 
Swivel Secure survey reveals that almost a fifth of employees reuse same username and password across every single online business and personal application
Mocana And VeliQ Partner To Protect Mobile Apps For BYOD
Products and Releases  |  4/30/2013  | 
Mocana Mobile App Protection to be integrated with VeliQ’s mobility Platform as a Service
Printers, Routers And Other Internet Devices Being Hijacked To Participate In DrDoS Cyber Attacks
Products and Releases  |  4/30/2013  | 
New Prolexic white paper explains how to secure your devices and infrastructure from SNMP, NTP, and CHARGEN attacks
Identity Guard Advises Consumers How To Take Extra Precaution Should Their Personal Information Become Compromised By A Company's Data Breach
Products and Releases  |  4/30/2013  | 
Offers five tips in light of the recent LivingSocial.com data breach
EiQ Networks Launches SOCVue Service To Address Industry-wide SIEM Operational Complexity And Security Professional Shortage
Products and Releases  |  4/30/2013  | 
New service enables small to midsize enterprises to improve cyberdefenses
Trend Micro Ramps Up Cloud Security Optimized For Amazon Web Services
Products and Releases  |  4/30/2013  | 
Trend Micro Deep Security as a Service use AWS APIs to automate and simplify the deployment process
Return Path Introduces Anti-Phishing Solution Capable Of Detecting Email-borne Threats That Spoof Addresses Beyond Brands' Control
Products and Releases  |  4/30/2013  | 
Offering complements traditional authentication-based solutions
BT Expands Cloud Compute Services Across Four Continents
Products and Releases  |  4/29/2013  | 
BT Cloud Compute is designed to help CIOs meet compliance requirements
DataX Unveils New Advanced Solutions For Mitigating Risk And Lead Fraud
Products and Releases  |  4/25/2013  | 
FraudScan2.0 uses a two-part advanced technology system to isolate fraudulent activity before additional verification is required
Guardian Analytics And Fundtech Announce Partnership to Deliver Industry's First Behavior-Based, Real-Time Fraud Prevention Solution
Products and Releases  |  4/25/2013  | 
Integrated solution addresses the growing problem of fraudulent wires initiated across banking channels
Radware Ltd. Announces First Quarter 2013 Results
Products and Releases  |  4/25/2013  | 
Reports quarterly revenues of $45.1 million for the first quarter of 2013
GFI Software Bolsters GFI Cloud With Patch Management Functionality
Products and Releases  |  4/25/2013  | 
IT admins can automatically manage patching from the solution’s single dashboard
Imperva Report Demonstrates Importance Of Crowdsourced Threat Intelligence
Products and Releases  |  4/25/2013  | 
New Hacker Intelligence Initiative report shows businesses can reduce risk by identifying and blocking attackers targeting multiple sources
Mobile Bot Traffic On Pace To Waste Nearly A Billion Dollars Of Advertising Budgets In 2013
Products and Releases  |  4/25/2013  | 
Solve Media's latest Bot Traffic Market Advisory update reveals increase in bot traffic during the first quarter of 2013
Employees Keeping Quiet On Potential Corporate Data Leaks
Products and Releases  |  4/25/2013  | 
Research from Kaspersky Lab reveals poor mobile device management strategies leaving business information exposed
Fixmo And U.S. Air Force Partner For Strategic Mobility
Products and Releases  |  4/25/2013  | 
Partnership to enable secure mobile communications and access to mission-critical applications from smartphones and tablets
TaaSERA's Malware Feed Detects Increased Botnets Connected To Russian Business Network
Products and Releases  |  4/25/2013  | 
TaaS NetAnalyzer features tight integration with TaaSERA’s new Attacker Intelligence Feed
Crocus Releases The Prototype Secure Authentication Engine
Products and Releases  |  4/24/2013  | 
Match in Place designed for smart card makers seeking to implement biometrics and other strong user authentication
G Data Security Generation 2014 Now Available
Products and Releases  |  4/24/2013  | 
Active hybrid protection closes holes and makes surfing, online banking and online shopping safe
Guardian Analytics Announces New Real-time Behavioral Analytics Solution To Prevent Wire Fraud Across All Banking Channels
Products and Releases  |  4/24/2013  | 
FraudMAP Wire applies company's analytics and automation capabilities to reduce wire risk and increase efficiency of wire operations
RIT Wins National Collegiate Cyber Defense Competition For First Time
Products and Releases  |  4/24/2013  | 
Students win national computing security competition in San Antonio
Barracuda Networks Rolls Out New Version Of NG Firewall
Products and Releases  |  4/24/2013  | 
Release 5.4 adds adding SSL inspection, granular detection of standard, and user-defined applications
Neustar Second Annual DDoS Survey Finds 35% Of Businesses Experienced A DDoS Attack In 2012
Products and Releases  |  4/24/2013  | 
More than a quarter of respondents also indicated a DDoS outage could cost between $50 to 100K per hour
AVG Reports Record Revenue, EPS And Cash Flow For First Quarter 2013
Products and Releases  |  4/24/2013  | 
Revenue increases 26% to $104.7 million
HP WebInspect 10.0 Helps Organizations Identify Vulnerabilities In Web Applications
Products and Releases  |  4/24/2013  | 
Solution tests Web applications and services to identify exploitable security vulnerabilities
Dell Rolls Out SonicWALL Hosted Email Security 2.0
Products and Releases  |  4/24/2013  | 
Offers inbound and outbound protection from threats including spam, phishing, zombie, and malware attacks
CSA Establishes New SMB Membership Level And Working Group
Products and Releases  |  4/24/2013  | 
Among its first priorities, the CSA SMB Working Group will be tasked with creating an SMB version of the CSA Guidance
MSPAlliance Unveils Cloud Insurance Program
Products and Releases  |  4/24/2013  | 
MSPA Cloud Insurance Program will offer comprehensive protection for cloud and MSPs worldwide
LynuxWorks Offers New Security Protection For Connected Embedded Devices
Products and Releases  |  4/24/2013  | 
New features added to the LynxSecure separation kernel help protect embedded systems from advanced cyberthreats
New Barracuda Security Product Launches: App Delivery, Application Control/Prioritization
Products and Releases  |  4/23/2013  | 
Barracuda ADC platform secures applications against attacks at both the network and application layer
SafeNet Announces Crypto Hypervisor
Products and Releases  |  4/23/2013  | 
Solution delivers key vaulting and encryption services on demand in a cloud operational model
Survey: 91% Of People Trust Business To Keep Data Safe Despite Rise In Breaches
Products and Releases  |  4/23/2013  | 
Varonis research reveals people take care to protect data but forget to get the basics right
Imperva Rolls Out SecureSphere 10.0
Products and Releases  |  4/23/2013  | 
Also introducing SecureSphere Directory Services Monitoring plus support for NFS, IMS, and PostgreSQL
ManageEngine Launches Privileged Password Management Software For Managed Service Providers
Products and Releases  |  4/23/2013  | 
Password Manager Pro MSP Edition allows MSPs to centrally manage the privileged passwords of their clients
Survey: 70% Of IT Security Pros Believe They Will Suffer A Data Breach In Next Six Months
Products and Releases  |  4/23/2013  | 
Lieberman study measures attitudes of nearly 250 IT security professionals and the way their organizations manage cybersecurity
Akamai Releases Fourth Quarter 2012 'State Of The Internet' Report
Products and Releases  |  4/23/2013  | 
Reported DDoS attacks grow more than 200 percent year over year
Trend Micro Q1 2013 Security Roundup Report Highlights Concerns Over Zero-Day Vulnerabilities And Increasingly Destructive Attacks
Products and Releases  |  4/23/2013  | 
Zero-days progress into attack kits before patches are available
New Research Shows Remote Users Expose Companies To Cybercrime
Products and Releases  |  4/23/2013  | 
Webroot study indicates that data theft is the primary goal in new types of mobile attacks
NIST Announces Plan To Sponsor First Cybersecurity FFRDC
Products and Releases  |  4/22/2013  | 
This will be the first FFRDC solely dedicated to enhancing the security of the nation's information systems
Armor5 Debuts 'Zero Touch' Mobile Security For BYOD
Products and Releases  |  4/19/2013  | 
Armor5 CloudSpace is a cloud-based service that virtualizes corporate data, apps and content on end users’ mobile devices
New Cloud-Based Anti-DDoS Services From Nexusguard Counter Growing Cyberattack Threats
Products and Releases  |  4/19/2013  | 
Nexusguard InfraProtect scrubs traffic at the source
SafeNet Envelope Protects Software From Piracy And Reverse Engineering
Products and Releases  |  4/19/2013  | 
Sentinel Envelope secures applications through the use of an automatic file wrapper
Fiberlink Unveils MaaS360 Secure Productivity Suite For Dual Persona
Products and Releases  |  4/19/2013  | 
MaaS360 provides policy management and data protection for the enterprise
Ponemon Study Demonstrates 75% Cost Savings When Using Hardware-Based Encryption
Products and Releases  |  4/18/2013  | 
Study compares the TCO of software vs. hardware-based full disk/drive encryption
Old Data May Create New Risks For Businesses
Products and Releases  |  4/18/2013  | 
Shred-it offers tips to help arm businesses against fraud before disposing of old electronic devices
70 Percent Of Software Professionals Say Code Review Essential
Products and Releases  |  4/18/2013  | 
SmartBear Software survey also revealed that software professionals do code review for three reasons
Silent Circle Launches Encrypted Email Service
Products and Releases  |  4/18/2013  | 
Silent Mail encryption compatible with popular e-mail client software
Page 1 / 3   >   >>

COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...