Products and Releases

Content posted in April 2013
Page 1 / 3   >   >>
Exploit Devs At Risk: The Nuclear Scientists Of The Next Decade?
Products and Releases  |  4/30/2013  | 
Will a nations exploit developers become the potential targets of state-sponsored assassinations in the future, much like the nuclear scientists of the past century?
Arxan Announces Mobile Application Integrity Protection For IBM MobileFirst Customers
Products and Releases  |  4/30/2013  | 
Introduces Arxan Mobile Application Integrity Protection for IBM Worklight Apps
Employee Negligence Makes U.K. 'Sitting Duck' For Cybercrime
Products and Releases  |  4/30/2013  | 
Swivel Secure survey reveals that almost a fifth of employees reuse same username and password across every single online business and personal application
Mocana And VeliQ Partner To Protect Mobile Apps For BYOD
Products and Releases  |  4/30/2013  | 
Mocana Mobile App Protection to be integrated with VeliQ’s mobility Platform as a Service
Printers, Routers And Other Internet Devices Being Hijacked To Participate In DrDoS Cyber Attacks
Products and Releases  |  4/30/2013  | 
New Prolexic white paper explains how to secure your devices and infrastructure from SNMP, NTP, and CHARGEN attacks
Identity Guard Advises Consumers How To Take Extra Precaution Should Their Personal Information Become Compromised By A Company's Data Breach
Products and Releases  |  4/30/2013  | 
Offers five tips in light of the recent LivingSocial.com data breach
EiQ Networks Launches SOCVue Service To Address Industry-wide SIEM Operational Complexity And Security Professional Shortage
Products and Releases  |  4/30/2013  | 
New service enables small to midsize enterprises to improve cyberdefenses
Trend Micro Ramps Up Cloud Security Optimized For Amazon Web Services
Products and Releases  |  4/30/2013  | 
Trend Micro Deep Security as a Service use AWS APIs to automate and simplify the deployment process
Return Path Introduces Anti-Phishing Solution Capable Of Detecting Email-borne Threats That Spoof Addresses Beyond Brands' Control
Products and Releases  |  4/30/2013  | 
Offering complements traditional authentication-based solutions
BT Expands Cloud Compute Services Across Four Continents
Products and Releases  |  4/29/2013  | 
BT Cloud Compute is designed to help CIOs meet compliance requirements
DataX Unveils New Advanced Solutions For Mitigating Risk And Lead Fraud
Products and Releases  |  4/25/2013  | 
FraudScan2.0 uses a two-part advanced technology system to isolate fraudulent activity before additional verification is required
Guardian Analytics And Fundtech Announce Partnership to Deliver Industry's First Behavior-Based, Real-Time Fraud Prevention Solution
Products and Releases  |  4/25/2013  | 
Integrated solution addresses the growing problem of fraudulent wires initiated across banking channels
Radware Ltd. Announces First Quarter 2013 Results
Products and Releases  |  4/25/2013  | 
Reports quarterly revenues of $45.1 million for the first quarter of 2013
GFI Software Bolsters GFI Cloud With Patch Management Functionality
Products and Releases  |  4/25/2013  | 
IT admins can automatically manage patching from the solution’s single dashboard
Imperva Report Demonstrates Importance Of Crowdsourced Threat Intelligence
Products and Releases  |  4/25/2013  | 
New Hacker Intelligence Initiative report shows businesses can reduce risk by identifying and blocking attackers targeting multiple sources
Mobile Bot Traffic On Pace To Waste Nearly A Billion Dollars Of Advertising Budgets In 2013
Products and Releases  |  4/25/2013  | 
Solve Media's latest Bot Traffic Market Advisory update reveals increase in bot traffic during the first quarter of 2013
Employees Keeping Quiet On Potential Corporate Data Leaks
Products and Releases  |  4/25/2013  | 
Research from Kaspersky Lab reveals poor mobile device management strategies leaving business information exposed
Fixmo And U.S. Air Force Partner For Strategic Mobility
Products and Releases  |  4/25/2013  | 
Partnership to enable secure mobile communications and access to mission-critical applications from smartphones and tablets
TaaSERA's Malware Feed Detects Increased Botnets Connected To Russian Business Network
Products and Releases  |  4/25/2013  | 
TaaS NetAnalyzer features tight integration with TaaSERA’s new Attacker Intelligence Feed
Crocus Releases The Prototype Secure Authentication Engine
Products and Releases  |  4/24/2013  | 
Match in Place designed for smart card makers seeking to implement biometrics and other strong user authentication
G Data Security Generation 2014 Now Available
Products and Releases  |  4/24/2013  | 
Active hybrid protection closes holes and makes surfing, online banking and online shopping safe
Guardian Analytics Announces New Real-time Behavioral Analytics Solution To Prevent Wire Fraud Across All Banking Channels
Products and Releases  |  4/24/2013  | 
FraudMAP Wire applies company's analytics and automation capabilities to reduce wire risk and increase efficiency of wire operations
RIT Wins National Collegiate Cyber Defense Competition For First Time
Products and Releases  |  4/24/2013  | 
Students win national computing security competition in San Antonio
Barracuda Networks Rolls Out New Version Of NG Firewall
Products and Releases  |  4/24/2013  | 
Release 5.4 adds adding SSL inspection, granular detection of standard, and user-defined applications
Neustar Second Annual DDoS Survey Finds 35% Of Businesses Experienced A DDoS Attack In 2012
Products and Releases  |  4/24/2013  | 
More than a quarter of respondents also indicated a DDoS outage could cost between $50 to 100K per hour
AVG Reports Record Revenue, EPS And Cash Flow For First Quarter 2013
Products and Releases  |  4/24/2013  | 
Revenue increases 26% to $104.7 million
HP WebInspect 10.0 Helps Organizations Identify Vulnerabilities In Web Applications
Products and Releases  |  4/24/2013  | 
Solution tests Web applications and services to identify exploitable security vulnerabilities
Dell Rolls Out SonicWALL Hosted Email Security 2.0
Products and Releases  |  4/24/2013  | 
Offers inbound and outbound protection from threats including spam, phishing, zombie, and malware attacks
CSA Establishes New SMB Membership Level And Working Group
Products and Releases  |  4/24/2013  | 
Among its first priorities, the CSA SMB Working Group will be tasked with creating an SMB version of the CSA Guidance
MSPAlliance Unveils Cloud Insurance Program
Products and Releases  |  4/24/2013  | 
MSPA Cloud Insurance Program will offer comprehensive protection for cloud and MSPs worldwide
LynuxWorks Offers New Security Protection For Connected Embedded Devices
Products and Releases  |  4/24/2013  | 
New features added to the LynxSecure separation kernel help protect embedded systems from advanced cyberthreats
New Barracuda Security Product Launches: App Delivery, Application Control/Prioritization
Products and Releases  |  4/23/2013  | 
Barracuda ADC platform secures applications against attacks at both the network and application layer
SafeNet Announces Crypto Hypervisor
Products and Releases  |  4/23/2013  | 
Solution delivers key vaulting and encryption services on demand in a cloud operational model
Survey: 91% Of People Trust Business To Keep Data Safe Despite Rise In Breaches
Products and Releases  |  4/23/2013  | 
Varonis research reveals people take care to protect data but forget to get the basics right
Imperva Rolls Out SecureSphere 10.0
Products and Releases  |  4/23/2013  | 
Also introducing SecureSphere Directory Services Monitoring plus support for NFS, IMS, and PostgreSQL
ManageEngine Launches Privileged Password Management Software For Managed Service Providers
Products and Releases  |  4/23/2013  | 
Password Manager Pro MSP Edition allows MSPs to centrally manage the privileged passwords of their clients
Survey: 70% Of IT Security Pros Believe They Will Suffer A Data Breach In Next Six Months
Products and Releases  |  4/23/2013  | 
Lieberman study measures attitudes of nearly 250 IT security professionals and the way their organizations manage cybersecurity
Akamai Releases Fourth Quarter 2012 'State Of The Internet' Report
Products and Releases  |  4/23/2013  | 
Reported DDoS attacks grow more than 200 percent year over year
Trend Micro Q1 2013 Security Roundup Report Highlights Concerns Over Zero-Day Vulnerabilities And Increasingly Destructive Attacks
Products and Releases  |  4/23/2013  | 
Zero-days progress into attack kits before patches are available
New Research Shows Remote Users Expose Companies To Cybercrime
Products and Releases  |  4/23/2013  | 
Webroot study indicates that data theft is the primary goal in new types of mobile attacks
NIST Announces Plan To Sponsor First Cybersecurity FFRDC
Products and Releases  |  4/22/2013  | 
This will be the first FFRDC solely dedicated to enhancing the security of the nation's information systems
Armor5 Debuts 'Zero Touch' Mobile Security For BYOD
Products and Releases  |  4/19/2013  | 
Armor5 CloudSpace is a cloud-based service that virtualizes corporate data, apps and content on end users’ mobile devices
New Cloud-Based Anti-DDoS Services From Nexusguard Counter Growing Cyberattack Threats
Products and Releases  |  4/19/2013  | 
Nexusguard InfraProtect scrubs traffic at the source
SafeNet Envelope Protects Software From Piracy And Reverse Engineering
Products and Releases  |  4/19/2013  | 
Sentinel Envelope secures applications through the use of an automatic file wrapper
Fiberlink Unveils MaaS360 Secure Productivity Suite For Dual Persona
Products and Releases  |  4/19/2013  | 
MaaS360 provides policy management and data protection for the enterprise
Ponemon Study Demonstrates 75% Cost Savings When Using Hardware-Based Encryption
Products and Releases  |  4/18/2013  | 
Study compares the TCO of software vs. hardware-based full disk/drive encryption
Old Data May Create New Risks For Businesses
Products and Releases  |  4/18/2013  | 
Shred-it offers tips to help arm businesses against fraud before disposing of old electronic devices
70 Percent Of Software Professionals Say Code Review Essential
Products and Releases  |  4/18/2013  | 
SmartBear Software survey also revealed that software professionals do code review for three reasons
Silent Circle Launches Encrypted Email Service
Products and Releases  |  4/18/2013  | 
Silent Mail encryption compatible with popular e-mail client software
Page 1 / 3   >   >>


13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
From DevOps to DevSecOps: Structuring Communication for Better Security
Robert Hawk, Privacy & Security Lead at xMatters,  2/15/2018
3 Tips to Keep Cybersecurity Front & Center
Greg Kushto, Vice President of Sales Engineering at Force 3,  2/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.