Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2013
Page 1 / 3   >   >>
Exploit Devs At Risk: The Nuclear Scientists Of The Next Decade?
Products and Releases  |  4/30/2013  | 
Will a nations exploit developers become the potential targets of state-sponsored assassinations in the future, much like the nuclear scientists of the past century?
Arxan Announces Mobile Application Integrity Protection For IBM MobileFirst Customers
Products and Releases  |  4/30/2013  | 
Introduces Arxan Mobile Application Integrity Protection for IBM Worklight Apps
Employee Negligence Makes U.K. 'Sitting Duck' For Cybercrime
Products and Releases  |  4/30/2013  | 
Swivel Secure survey reveals that almost a fifth of employees reuse same username and password across every single online business and personal application
Mocana And VeliQ Partner To Protect Mobile Apps For BYOD
Products and Releases  |  4/30/2013  | 
Mocana Mobile App Protection to be integrated with VeliQ’s mobility Platform as a Service
Printers, Routers And Other Internet Devices Being Hijacked To Participate In DrDoS Cyber Attacks
Products and Releases  |  4/30/2013  | 
New Prolexic white paper explains how to secure your devices and infrastructure from SNMP, NTP, and CHARGEN attacks
Identity Guard Advises Consumers How To Take Extra Precaution Should Their Personal Information Become Compromised By A Company's Data Breach
Products and Releases  |  4/30/2013  | 
Offers five tips in light of the recent LivingSocial.com data breach
EiQ Networks Launches SOCVue Service To Address Industry-wide SIEM Operational Complexity And Security Professional Shortage
Products and Releases  |  4/30/2013  | 
New service enables small to midsize enterprises to improve cyberdefenses
Trend Micro Ramps Up Cloud Security Optimized For Amazon Web Services
Products and Releases  |  4/30/2013  | 
Trend Micro Deep Security as a Service use AWS APIs to automate and simplify the deployment process
Return Path Introduces Anti-Phishing Solution Capable Of Detecting Email-borne Threats That Spoof Addresses Beyond Brands' Control
Products and Releases  |  4/30/2013  | 
Offering complements traditional authentication-based solutions
BT Expands Cloud Compute Services Across Four Continents
Products and Releases  |  4/29/2013  | 
BT Cloud Compute is designed to help CIOs meet compliance requirements
DataX Unveils New Advanced Solutions For Mitigating Risk And Lead Fraud
Products and Releases  |  4/25/2013  | 
FraudScan2.0 uses a two-part advanced technology system to isolate fraudulent activity before additional verification is required
Guardian Analytics And Fundtech Announce Partnership to Deliver Industry's First Behavior-Based, Real-Time Fraud Prevention Solution
Products and Releases  |  4/25/2013  | 
Integrated solution addresses the growing problem of fraudulent wires initiated across banking channels
Radware Ltd. Announces First Quarter 2013 Results
Products and Releases  |  4/25/2013  | 
Reports quarterly revenues of $45.1 million for the first quarter of 2013
GFI Software Bolsters GFI Cloud With Patch Management Functionality
Products and Releases  |  4/25/2013  | 
IT admins can automatically manage patching from the solution’s single dashboard
Imperva Report Demonstrates Importance Of Crowdsourced Threat Intelligence
Products and Releases  |  4/25/2013  | 
New Hacker Intelligence Initiative report shows businesses can reduce risk by identifying and blocking attackers targeting multiple sources
Mobile Bot Traffic On Pace To Waste Nearly A Billion Dollars Of Advertising Budgets In 2013
Products and Releases  |  4/25/2013  | 
Solve Media's latest Bot Traffic Market Advisory update reveals increase in bot traffic during the first quarter of 2013
Employees Keeping Quiet On Potential Corporate Data Leaks
Products and Releases  |  4/25/2013  | 
Research from Kaspersky Lab reveals poor mobile device management strategies leaving business information exposed
Fixmo And U.S. Air Force Partner For Strategic Mobility
Products and Releases  |  4/25/2013  | 
Partnership to enable secure mobile communications and access to mission-critical applications from smartphones and tablets
TaaSERA's Malware Feed Detects Increased Botnets Connected To Russian Business Network
Products and Releases  |  4/25/2013  | 
TaaS NetAnalyzer features tight integration with TaaSERA’s new Attacker Intelligence Feed
Crocus Releases The Prototype Secure Authentication Engine
Products and Releases  |  4/24/2013  | 
Match in Place designed for smart card makers seeking to implement biometrics and other strong user authentication
G Data Security Generation 2014 Now Available
Products and Releases  |  4/24/2013  | 
Active hybrid protection closes holes and makes surfing, online banking and online shopping safe
Guardian Analytics Announces New Real-time Behavioral Analytics Solution To Prevent Wire Fraud Across All Banking Channels
Products and Releases  |  4/24/2013  | 
FraudMAP Wire applies company's analytics and automation capabilities to reduce wire risk and increase efficiency of wire operations
RIT Wins National Collegiate Cyber Defense Competition For First Time
Products and Releases  |  4/24/2013  | 
Students win national computing security competition in San Antonio
Barracuda Networks Rolls Out New Version Of NG Firewall
Products and Releases  |  4/24/2013  | 
Release 5.4 adds adding SSL inspection, granular detection of standard, and user-defined applications
Neustar Second Annual DDoS Survey Finds 35% Of Businesses Experienced A DDoS Attack In 2012
Products and Releases  |  4/24/2013  | 
More than a quarter of respondents also indicated a DDoS outage could cost between $50 to 100K per hour
AVG Reports Record Revenue, EPS And Cash Flow For First Quarter 2013
Products and Releases  |  4/24/2013  | 
Revenue increases 26% to $104.7 million
HP WebInspect 10.0 Helps Organizations Identify Vulnerabilities In Web Applications
Products and Releases  |  4/24/2013  | 
Solution tests Web applications and services to identify exploitable security vulnerabilities
Dell Rolls Out SonicWALL Hosted Email Security 2.0
Products and Releases  |  4/24/2013  | 
Offers inbound and outbound protection from threats including spam, phishing, zombie, and malware attacks
CSA Establishes New SMB Membership Level And Working Group
Products and Releases  |  4/24/2013  | 
Among its first priorities, the CSA SMB Working Group will be tasked with creating an SMB version of the CSA Guidance
MSPAlliance Unveils Cloud Insurance Program
Products and Releases  |  4/24/2013  | 
MSPA Cloud Insurance Program will offer comprehensive protection for cloud and MSPs worldwide
LynuxWorks Offers New Security Protection For Connected Embedded Devices
Products and Releases  |  4/24/2013  | 
New features added to the LynxSecure separation kernel help protect embedded systems from advanced cyberthreats
New Barracuda Security Product Launches: App Delivery, Application Control/Prioritization
Products and Releases  |  4/23/2013  | 
Barracuda ADC platform secures applications against attacks at both the network and application layer
SafeNet Announces Crypto Hypervisor
Products and Releases  |  4/23/2013  | 
Solution delivers key vaulting and encryption services on demand in a cloud operational model
Survey: 91% Of People Trust Business To Keep Data Safe Despite Rise In Breaches
Products and Releases  |  4/23/2013  | 
Varonis research reveals people take care to protect data but forget to get the basics right
Imperva Rolls Out SecureSphere 10.0
Products and Releases  |  4/23/2013  | 
Also introducing SecureSphere Directory Services Monitoring plus support for NFS, IMS, and PostgreSQL
ManageEngine Launches Privileged Password Management Software For Managed Service Providers
Products and Releases  |  4/23/2013  | 
Password Manager Pro MSP Edition allows MSPs to centrally manage the privileged passwords of their clients
Survey: 70% Of IT Security Pros Believe They Will Suffer A Data Breach In Next Six Months
Products and Releases  |  4/23/2013  | 
Lieberman study measures attitudes of nearly 250 IT security professionals and the way their organizations manage cybersecurity
Akamai Releases Fourth Quarter 2012 'State Of The Internet' Report
Products and Releases  |  4/23/2013  | 
Reported DDoS attacks grow more than 200 percent year over year
Trend Micro Q1 2013 Security Roundup Report Highlights Concerns Over Zero-Day Vulnerabilities And Increasingly Destructive Attacks
Products and Releases  |  4/23/2013  | 
Zero-days progress into attack kits before patches are available
New Research Shows Remote Users Expose Companies To Cybercrime
Products and Releases  |  4/23/2013  | 
Webroot study indicates that data theft is the primary goal in new types of mobile attacks
NIST Announces Plan To Sponsor First Cybersecurity FFRDC
Products and Releases  |  4/22/2013  | 
This will be the first FFRDC solely dedicated to enhancing the security of the nation's information systems
Armor5 Debuts 'Zero Touch' Mobile Security For BYOD
Products and Releases  |  4/19/2013  | 
Armor5 CloudSpace is a cloud-based service that virtualizes corporate data, apps and content on end users’ mobile devices
New Cloud-Based Anti-DDoS Services From Nexusguard Counter Growing Cyberattack Threats
Products and Releases  |  4/19/2013  | 
Nexusguard InfraProtect scrubs traffic at the source
SafeNet Envelope Protects Software From Piracy And Reverse Engineering
Products and Releases  |  4/19/2013  | 
Sentinel Envelope secures applications through the use of an automatic file wrapper
Fiberlink Unveils MaaS360 Secure Productivity Suite For Dual Persona
Products and Releases  |  4/19/2013  | 
MaaS360 provides policy management and data protection for the enterprise
Ponemon Study Demonstrates 75% Cost Savings When Using Hardware-Based Encryption
Products and Releases  |  4/18/2013  | 
Study compares the TCO of software vs. hardware-based full disk/drive encryption
Old Data May Create New Risks For Businesses
Products and Releases  |  4/18/2013  | 
Shred-it offers tips to help arm businesses against fraud before disposing of old electronic devices
70 Percent Of Software Professionals Say Code Review Essential
Products and Releases  |  4/18/2013  | 
SmartBear Software survey also revealed that software professionals do code review for three reasons
Silent Circle Launches Encrypted Email Service
Products and Releases  |  4/18/2013  | 
Silent Mail encryption compatible with popular e-mail client software
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file