Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2013
Page 1 / 3   >   >>
Exploit Devs At Risk: The Nuclear Scientists Of The Next Decade?
Products and Releases  |  4/30/2013  | 
Will a nations exploit developers become the potential targets of state-sponsored assassinations in the future, much like the nuclear scientists of the past century?
Arxan Announces Mobile Application Integrity Protection For IBM MobileFirst Customers
Products and Releases  |  4/30/2013  | 
Introduces Arxan Mobile Application Integrity Protection for IBM Worklight Apps
Employee Negligence Makes U.K. 'Sitting Duck' For Cybercrime
Products and Releases  |  4/30/2013  | 
Swivel Secure survey reveals that almost a fifth of employees reuse same username and password across every single online business and personal application
Mocana And VeliQ Partner To Protect Mobile Apps For BYOD
Products and Releases  |  4/30/2013  | 
Mocana Mobile App Protection to be integrated with VeliQ’s mobility Platform as a Service
Printers, Routers And Other Internet Devices Being Hijacked To Participate In DrDoS Cyber Attacks
Products and Releases  |  4/30/2013  | 
New Prolexic white paper explains how to secure your devices and infrastructure from SNMP, NTP, and CHARGEN attacks
Identity Guard Advises Consumers How To Take Extra Precaution Should Their Personal Information Become Compromised By A Company's Data Breach
Products and Releases  |  4/30/2013  | 
Offers five tips in light of the recent LivingSocial.com data breach
EiQ Networks Launches SOCVue Service To Address Industry-wide SIEM Operational Complexity And Security Professional Shortage
Products and Releases  |  4/30/2013  | 
New service enables small to midsize enterprises to improve cyberdefenses
Trend Micro Ramps Up Cloud Security Optimized For Amazon Web Services
Products and Releases  |  4/30/2013  | 
Trend Micro Deep Security as a Service use AWS APIs to automate and simplify the deployment process
Return Path Introduces Anti-Phishing Solution Capable Of Detecting Email-borne Threats That Spoof Addresses Beyond Brands' Control
Products and Releases  |  4/30/2013  | 
Offering complements traditional authentication-based solutions
BT Expands Cloud Compute Services Across Four Continents
Products and Releases  |  4/29/2013  | 
BT Cloud Compute is designed to help CIOs meet compliance requirements
DataX Unveils New Advanced Solutions For Mitigating Risk And Lead Fraud
Products and Releases  |  4/25/2013  | 
FraudScan2.0 uses a two-part advanced technology system to isolate fraudulent activity before additional verification is required
Guardian Analytics And Fundtech Announce Partnership to Deliver Industry's First Behavior-Based, Real-Time Fraud Prevention Solution
Products and Releases  |  4/25/2013  | 
Integrated solution addresses the growing problem of fraudulent wires initiated across banking channels
Radware Ltd. Announces First Quarter 2013 Results
Products and Releases  |  4/25/2013  | 
Reports quarterly revenues of $45.1 million for the first quarter of 2013
GFI Software Bolsters GFI Cloud With Patch Management Functionality
Products and Releases  |  4/25/2013  | 
IT admins can automatically manage patching from the solution’s single dashboard
Imperva Report Demonstrates Importance Of Crowdsourced Threat Intelligence
Products and Releases  |  4/25/2013  | 
New Hacker Intelligence Initiative report shows businesses can reduce risk by identifying and blocking attackers targeting multiple sources
Mobile Bot Traffic On Pace To Waste Nearly A Billion Dollars Of Advertising Budgets In 2013
Products and Releases  |  4/25/2013  | 
Solve Media's latest Bot Traffic Market Advisory update reveals increase in bot traffic during the first quarter of 2013
Employees Keeping Quiet On Potential Corporate Data Leaks
Products and Releases  |  4/25/2013  | 
Research from Kaspersky Lab reveals poor mobile device management strategies leaving business information exposed
Fixmo And U.S. Air Force Partner For Strategic Mobility
Products and Releases  |  4/25/2013  | 
Partnership to enable secure mobile communications and access to mission-critical applications from smartphones and tablets
TaaSERA's Malware Feed Detects Increased Botnets Connected To Russian Business Network
Products and Releases  |  4/25/2013  | 
TaaS NetAnalyzer features tight integration with TaaSERA’s new Attacker Intelligence Feed
Crocus Releases The Prototype Secure Authentication Engine
Products and Releases  |  4/24/2013  | 
Match in Place designed for smart card makers seeking to implement biometrics and other strong user authentication
G Data Security Generation 2014 Now Available
Products and Releases  |  4/24/2013  | 
Active hybrid protection closes holes and makes surfing, online banking and online shopping safe
Guardian Analytics Announces New Real-time Behavioral Analytics Solution To Prevent Wire Fraud Across All Banking Channels
Products and Releases  |  4/24/2013  | 
FraudMAP Wire applies company's analytics and automation capabilities to reduce wire risk and increase efficiency of wire operations
RIT Wins National Collegiate Cyber Defense Competition For First Time
Products and Releases  |  4/24/2013  | 
Students win national computing security competition in San Antonio
Barracuda Networks Rolls Out New Version Of NG Firewall
Products and Releases  |  4/24/2013  | 
Release 5.4 adds adding SSL inspection, granular detection of standard, and user-defined applications
Neustar Second Annual DDoS Survey Finds 35% Of Businesses Experienced A DDoS Attack In 2012
Products and Releases  |  4/24/2013  | 
More than a quarter of respondents also indicated a DDoS outage could cost between $50 to 100K per hour
AVG Reports Record Revenue, EPS And Cash Flow For First Quarter 2013
Products and Releases  |  4/24/2013  | 
Revenue increases 26% to $104.7 million
HP WebInspect 10.0 Helps Organizations Identify Vulnerabilities In Web Applications
Products and Releases  |  4/24/2013  | 
Solution tests Web applications and services to identify exploitable security vulnerabilities
Dell Rolls Out SonicWALL Hosted Email Security 2.0
Products and Releases  |  4/24/2013  | 
Offers inbound and outbound protection from threats including spam, phishing, zombie, and malware attacks
CSA Establishes New SMB Membership Level And Working Group
Products and Releases  |  4/24/2013  | 
Among its first priorities, the CSA SMB Working Group will be tasked with creating an SMB version of the CSA Guidance
MSPAlliance Unveils Cloud Insurance Program
Products and Releases  |  4/24/2013  | 
MSPA Cloud Insurance Program will offer comprehensive protection for cloud and MSPs worldwide
LynuxWorks Offers New Security Protection For Connected Embedded Devices
Products and Releases  |  4/24/2013  | 
New features added to the LynxSecure separation kernel help protect embedded systems from advanced cyberthreats
New Barracuda Security Product Launches: App Delivery, Application Control/Prioritization
Products and Releases  |  4/23/2013  | 
Barracuda ADC platform secures applications against attacks at both the network and application layer
SafeNet Announces Crypto Hypervisor
Products and Releases  |  4/23/2013  | 
Solution delivers key vaulting and encryption services on demand in a cloud operational model
Survey: 91% Of People Trust Business To Keep Data Safe Despite Rise In Breaches
Products and Releases  |  4/23/2013  | 
Varonis research reveals people take care to protect data but forget to get the basics right
Imperva Rolls Out SecureSphere 10.0
Products and Releases  |  4/23/2013  | 
Also introducing SecureSphere Directory Services Monitoring plus support for NFS, IMS, and PostgreSQL
ManageEngine Launches Privileged Password Management Software For Managed Service Providers
Products and Releases  |  4/23/2013  | 
Password Manager Pro MSP Edition allows MSPs to centrally manage the privileged passwords of their clients
Survey: 70% Of IT Security Pros Believe They Will Suffer A Data Breach In Next Six Months
Products and Releases  |  4/23/2013  | 
Lieberman study measures attitudes of nearly 250 IT security professionals and the way their organizations manage cybersecurity
Akamai Releases Fourth Quarter 2012 'State Of The Internet' Report
Products and Releases  |  4/23/2013  | 
Reported DDoS attacks grow more than 200 percent year over year
Trend Micro Q1 2013 Security Roundup Report Highlights Concerns Over Zero-Day Vulnerabilities And Increasingly Destructive Attacks
Products and Releases  |  4/23/2013  | 
Zero-days progress into attack kits before patches are available
New Research Shows Remote Users Expose Companies To Cybercrime
Products and Releases  |  4/23/2013  | 
Webroot study indicates that data theft is the primary goal in new types of mobile attacks
NIST Announces Plan To Sponsor First Cybersecurity FFRDC
Products and Releases  |  4/22/2013  | 
This will be the first FFRDC solely dedicated to enhancing the security of the nation's information systems
Armor5 Debuts 'Zero Touch' Mobile Security For BYOD
Products and Releases  |  4/19/2013  | 
Armor5 CloudSpace is a cloud-based service that virtualizes corporate data, apps and content on end users’ mobile devices
New Cloud-Based Anti-DDoS Services From Nexusguard Counter Growing Cyberattack Threats
Products and Releases  |  4/19/2013  | 
Nexusguard InfraProtect scrubs traffic at the source
SafeNet Envelope Protects Software From Piracy And Reverse Engineering
Products and Releases  |  4/19/2013  | 
Sentinel Envelope secures applications through the use of an automatic file wrapper
Fiberlink Unveils MaaS360 Secure Productivity Suite For Dual Persona
Products and Releases  |  4/19/2013  | 
MaaS360 provides policy management and data protection for the enterprise
Ponemon Study Demonstrates 75% Cost Savings When Using Hardware-Based Encryption
Products and Releases  |  4/18/2013  | 
Study compares the TCO of software vs. hardware-based full disk/drive encryption
Old Data May Create New Risks For Businesses
Products and Releases  |  4/18/2013  | 
Shred-it offers tips to help arm businesses against fraud before disposing of old electronic devices
70 Percent Of Software Professionals Say Code Review Essential
Products and Releases  |  4/18/2013  | 
SmartBear Software survey also revealed that software professionals do code review for three reasons
Silent Circle Launches Encrypted Email Service
Products and Releases  |  4/18/2013  | 
Silent Mail encryption compatible with popular e-mail client software
Page 1 / 3   >   >>

7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.